TY - GEN
T1 - Zero-stealthy attack for sampled-data control systems
T2 - 55th IEEE Conference on Decision and Control, CDC 2016
AU - Kim, Jihan
AU - Park, Gyunghoon
AU - Shim, Hyungbo
AU - Eun, Yongsoon
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/27
Y1 - 2016/12/27
N2 - In this paper, we introduce a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical system, that is modeled as a continuous-time LTI system, is controlled by a digital controller, i.e., the output is measured only at discrete sensing times. Since the anomaly detector monitors the output signal, nothing abnormal can be detected through the output if the output looks normal at sensing times. This implies that if an (actuator) attack drives the internal states passing through the kernel of the output matrix at each sensing time, then the attack compromises the system while it remains stealthy. We show that this type of attack is feasible when the control system uses multi-rate sampling, and the sampling rate for input signal is higher than that for output measurements. Simulation results for the X-38 vehicle illustrate this new attack strategy possibly brings disastrous consequences.
AB - In this paper, we introduce a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical system, that is modeled as a continuous-time LTI system, is controlled by a digital controller, i.e., the output is measured only at discrete sensing times. Since the anomaly detector monitors the output signal, nothing abnormal can be detected through the output if the output looks normal at sensing times. This implies that if an (actuator) attack drives the internal states passing through the kernel of the output matrix at each sensing time, then the attack compromises the system while it remains stealthy. We show that this type of attack is feasible when the control system uses multi-rate sampling, and the sampling rate for input signal is higher than that for output measurements. Simulation results for the X-38 vehicle illustrate this new attack strategy possibly brings disastrous consequences.
UR - http://www.scopus.com/inward/record.url?scp=85010809720&partnerID=8YFLogxK
U2 - 10.1109/CDC.2016.7799183
DO - 10.1109/CDC.2016.7799183
M3 - Conference contribution
AN - SCOPUS:85010809720
T3 - 2016 IEEE 55th Conference on Decision and Control, CDC 2016
SP - 5956
EP - 5961
BT - 2016 IEEE 55th Conference on Decision and Control, CDC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 12 December 2016 through 14 December 2016
ER -