- Cinzia Bernardeschi ORCID:orcid.org/0000-0003-1604-44651,
- Andrea Domenici ORCID:orcid.org/0000-0003-0685-28641 &
- Maurizio Palmieri ORCID:orcid.org/0000-0002-6177-09282
441Accesses
Abstract
This paper presents a methodology for the formal modeling of security attacks on cyber-physical systems, and the analysis of their effects on the system using logic theories. We consider attacks only on sensors and actuators. A simulated attack can be triggered internally by the simulation algorithm or interactively by the user, and the effect of the attack is a set of assignments to the variables defined in the Controller. The global effects of the attacks are studied by injecting attacks in the system model and co-simulating the overall system, including the system dynamics and the control part. Interesting properties of the behavior of the system under attack can also be formally proved by theorem proving. The INTO-CPS framework has been used for co-simulation, and the methodology is applied to the Line follower robot case study of the INTO-CPS project. The theorem prover of PVS has been used for deriving formal proofs of invariants of the system under attack.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.











Similar content being viewed by others
References
Alguliyev, R., Imamverdiyev, Y., Sukhostat, L.: Cyber-physical systems and their security issues. Computers in Industry100, 212–223 (2018).https://doi.org/10.1016/j.compind.2018.04.017
Alur, R., Dill, D.L.: A theory of timed automata. Theoretical Computer Science126(2), 183–235 (1994)
Avvenuti, M., Bernardeschi, C., Francesco, N.D., Masci, P.: JCSI: A tool for checking secure information flow in java card applications. Journal of Systems and Software85(11), 2479–2493 (2012).https://doi.org/10.1016/j.jss.2012.05.061
Bagnato, A., Brosse, E., Quadri, I., Sadovykh, A.: INTO-CPS: An integrated “tool chain” for comprehensive model-based design of cyber-physical systems (2015). This publication is part of the Horizon 2020 project: Integrated Tool chain for model-based design of CPSs (INTO-CPS), project/GA number 644047
Bernardeschi, C., Cassano, L., Domenici, A., Sterpone, L.: ASSESS: A simulator of soft errors in the configuration memory of SRAM-Based FPGAs. IEEE Trans. on CAD of Integrated Circuits and Systems33(9), 1342–1355 (2014).https://doi.org/10.1109/TCAD.2014.2329419
Bernardeschi, C., Domenici, A.: Verifying safety properties of a nonlinear control by interactive theorem proving with the Prototype Verification System. Inf. Process. Lett.116(6), 409–415 (2016).https://doi.org/10.1016/j.ipl.2016.02.001
Bernardeschi, C., Domenici, A., Masci, P.: A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems. IEEE Trans. Software Eng.44(6), 512–533 (2018).https://doi.org/10.1109/TSE.2017.2694423
Blochwitz, T., Otter, M., Akesson, J., Arnold, M., Clauß, C., Elmqvist, H., Friedrich, M., Junghanns, A., Mauss, J., Neumerkel, D., Olsson, H., Viel, A.: Functional Mockup Interface 2.0: The Standard for Tool independent Exchange of Simulation Models. In: Proceedings of the 9th International MODELICA Conference;September 3-5; 2012; Munich; Germany, no. 76 in Linköping Electronic Conference Proceedings, pp. 173–184. Linköping University Electronic Press (2012).https://doi.org/10.3384/ecp12076173
Broenink, J.F.: 20-SIM software for hierarchical bond-graph/block-diagram models. Simulation Practice and Theory7(5), 481–492 (1999).https://doi.org/10.1016/S0928-4869(99)00018-X
Burmester, M., Magkos, E., Chrissikopoulos, V.: Modeling security in cyber-physical systems. International Journal of Critical Infrastructure Protection5(3), 118–126 (2012).https://doi.org/10.1016/j.ijcip.2012.08.002
Butler, M., Jones, C., Romanovsky, A., Troubitsyna, E. (eds.): Methods. Models and Tools for Fault Tolerance. Springer-Verlag, Berlin, Heidelberg (2009)
Dutertre, B.: Elements of mathematical analysis in pvs. In: Proceedings of the 9th International Conference on Theorem Proving in Higher Order Logics, TPHOLs ’96, pp. 141–156. Springer-Verlag, Berlin, Heidelberg (1996)
Ferrante, A., Kaitovic, I., Milosevic, J.: Modelling requirements for security-enhanced design of embedded systems (2014).https://doi.org/10.5220/0005050003150320
Fränzle, M., Herde, C.: Hysat: An efficient proof engine for bounded model checking of hybrid systems. Formal Methods in System Design30(3), 179–198 (2007).https://doi.org/10.1007/s10703-006-0031-0
Frehse, G., Le Guernic, C., Donzé, A., Cotton, S., Ray, R., Lebeltel, O., Ripado, R., Girard, A., Dang, T., Maler, O.: Spaceex: Scalable verification of hybrid systems. In: G. Gopalakrishnan, S. Qadeer (eds.) Proc. 23rd International Conference on Computer Aided Verification (CAV), no. 6806 in LNCS, pp. 379–395. Springer (2011).https://doi.org/10.1007/978-3-642-22110-1_30
Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-Physical Systems Security–A Survey. IEEE Internet of Things Journal4(6), 1802–1831 (2017).https://doi.org/10.1109/JIOT.2017.2703172
Jeannin, J., Ghorbal, K., Kouskoulas, Y., Gardner, R., Schmidt, A., Zawadzki, E., Platzer, A.: A formally verified hybrid system for the next-generation airborne collision avoidance system. In: C. Baier, C. Tinelli (eds.) TACAS,LNCS, vol. 9035, pp. 21–36. Springer (2015).https://doi.org/10.1007/978-3-662-46681-0_2
Khalil, Y.: A novel probabilistically timed dynamic model for physical security attack scenarios on critical infrastructures. Process Safety and Environmental Protection102, 473–484 (2016).https://doi.org/10.1016/j.psep.2016.05.001
Lanotte, R., Merro, M., Tini, S.: Towards a formal notion of impact metric for cyber-physical attacks. In: Integrated Formal Methods - 14th International Conference, IFM 2018, Proceedings, pp. 296–315 (2018).https://doi.org/10.1007/978-3-319-98938-9_17
Larsen, P.G., Battle, N., Ferreira, M., Fitzgerald, J., Lausdahl, K., Verhoef, M.: The Overture Initiative Integrating Tools for VDM. SIGSOFT Softw. Eng. Notes35(1), 1–6 (2010).https://doi.org/10.1145/1668862.1668864
Larsen, P.G., Fitzgerald, J., Woodcock, J., Fritzson, P., Brauer, J., Kleijn, C., Lecomte, T., Pfeil, M., Green, O., Basagiannis, S., Sadovykh, A.: Integrated tool chain for model-based design of Cyber-Physical Systems: The INTO-CPS project. In: 2016 2nd International Workshop on Modelling, Analysis, and Control of Complex CPS (CPS Data), pp. 1–6 (2016).https://doi.org/10.1109/CPSData.2016.7496424
Masci, P., Zhang, Y., Jones, P.L., Oladimeji, P., D’Urso, E., Bernardeschi, C., Curzon, P., Thimbleby, H.: Combining PVSio with Stateflow. In: NASA Formal Methods - 6th International Symposium, NFM 2014, Houston, TX, USA, April 29 - May 1, 2014. Proceedings, pp. 209–214 (2014).https://doi.org/10.1007/978-3-319-06200-6_16
Mauro, G., Thimbleby, H., Domenici, A., Bernardeschi, C.: Extending a user interface prototyping tool with automatic MISRA C code generation. In: C. Dubois, P. Masci, D. Méry (eds.) Proceedings of the Third Workshop on Formal Integrated Development Environment, Limassol, Cyprus, November 8, 2016,Electronic Proceedings in Theoretical Computer Science, vol. 240, pp. 53–66. Open Publishing Association, (2017).https://doi.org/10.4204/EPTCS.240.4
Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications21(1), 44–54 (2003).https://doi.org/10.1109/JSAC.2002.806125
Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.: Hey malware, i can find you! pp. 261–262 (2016).https://doi.org/10.1109/WETICE.2016.67
Mitchell, R., Chen, I.: Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Transactions on Reliability65(1), 350–358 (2016).https://doi.org/10.1109/TR.2015.2406860
Mitsch, S., Ghorbal, K., Platzer, A.: On provably safe obstacle avoidance for autonomous robotic ground vehicles. In: P. Newman, D. Fox, D. Hsu (eds.) Robotics: Science and Systems (2013)
Modelio web site (2018).http://www.modelio.org retrieved 11/29/2018
Muñoz, C.: Rapid prototyping in PVS. Tech. Rep. NIA 2003-03, NASA/CR-2003-212418, National Institute of Aerospace, Hampton, VA, USA (2003)
Oladimeji, P., Masci, P., Curzon, P., Thimbleby, H.: PVSio-web: a tool for rapid prototyping device user interfaces in PVS. In: FMIS2013, 5th International Workshop on Formal Methods for Interactive Systems, London, UK, June 24, 2013 (2013).https://doi.org/10.14279/tuj.eceasst.69.963.944
Owre, S., Rushby, J., Shankar, N.: PVS: A prototype verification system. In: D. Kapur (ed.) Automated Deduction — CADE-11,Lecture Notes in Computer Science, vol. 607, pp. 748–752. Springer Berlin Heidelberg (1992).https://doi.org/10.1007/3-540-55602-8_217
Owre, S., Rushby, J., Shankar, N., Von Henke, F.: Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Transactions on Software Engineering21(2), 107–125 (1995)
Palmieri, M., Bernardeschi, C., Masci, P.: Co-simulation of semi-autonomous systems: The line follower robot case study. In: Software Engineering and Formal Methods — SEFM 2017 Collocated Workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4-5, 2017, Revised Selected Papers, pp. 423–437 (2017).https://doi.org/10.1007/978-3-319-74781-1_29
Palmieri, M., Bernardeschi, C., Masci, P.: A framework for fmi-based co-simulation of human-machine interfaces. Software and Systems Modeling (2019).https://doi.org/10.1007/s10270-019-00754-9
Platzer, A., Quesel, J.D.: Keymaera: A hybrid theorem prover for hybrid systems. In: 3rd International Joint Conference on Automated Reasoning (IJCAR), vol. Lecture Notes in Computer Science, pp. 171–178 (2008).https://doi.org/10.1109/ISRCS.2012.6309293
Yampolskiy, M., Horvath, P., Koutsoukos, X.D., Xue, Y., Sztipanovits, J.: Systematic analysis of cyber-attacks on cps-evaluating applicability of dfd-based approach. In: 2012 5th International Symposium on Resilient Control Systems, pp. 55–62 (2012).https://doi.org/10.1109/ISRCS.2012.6309293
Acknowledgements
Work partially supported by the Italian Ministry of Education and Research (MIUR) in the framework of the CrossLab project (Departments of Excellence). The authors also thank the INTO-CPS project for providing the case study and the co-simulation environment.
Author information
Authors and Affiliations
Department of Information Engineering, University of Pisa, Pisa, Italy
Cinzia Bernardeschi & Andrea Domenici
Department of Information Engineering, University of Florence, Florence, Italy
Maurizio Palmieri
- Cinzia Bernardeschi
You can also search for this author inPubMed Google Scholar
- Andrea Domenici
You can also search for this author inPubMed Google Scholar
- Maurizio Palmieri
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toCinzia Bernardeschi.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bernardeschi, C., Domenici, A. & Palmieri, M. Formalization and co-simulation of attacks on cyber-physical systems.J Comput Virol Hack Tech16, 63–77 (2020). https://doi.org/10.1007/s11416-019-00344-9
Received:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative