4.2 Article

Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies

Shoma Matsui et al.

Summary: This research focuses on the vulnerability of communication protocols in distributed systems and proposes a formal synthesis methodology for successful attacks against two well-known protocols. The approach considers the attacker's partial observability and controllability of system events and employs supervisory control theory for discrete event systems. The study presents several scenarios of person-in-the-middle attacks and showcases the results of attack synthesis using the proposed methodology.

DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS (2022)

Article Automation & Control Systems

Synthesis of sensor deception attacks at the supervisory layer of Cyber-Physical Systems

Romulo Meira-Goes et al.

AUTOMATICA (2020)

Article Mathematics, Interdisciplinary Applications

Supervisory Control of Discrete-Event Systems Under Attacks

Masashi Wakaiki et al.

DYNAMIC GAMES AND APPLICATIONS (2019)

Article Automation & Control Systems

Detection and mitigation of classes of attacks in supervisory control systems

Lilian Kawakami Carvalho et al.

AUTOMATICA (2018)

Article Automation & Control Systems

Supervisory control and reactive synthesis: a comparative introduction

Ruediger Ehlers et al.

DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS (2017)

Article Automation & Control Systems

Synthesis of Maximally Permissive Supervisors for Partially-Observed Discrete-Event Systems

Xiang Yin et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)

Proceedings Paper Computer Science, Software Engineering

Multi-representational Security Analysis

Eunsuk Kang et al.

FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING (2016)

Proceedings Paper Computer Science, Theory & Methods

Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations

Samuel Jero et al.

2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (2015)

Article Automation & Control Systems

Eliminating Concurrency Bugs in Multithreaded Software: A New Approach Based on Discrete-Event Control

Hongwei Liao et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2013)