Using Information Flow Methods to Secure Cyber-Physical Systems
Abstract
The problems involved in securing cyber-physical systems are well known to the critical infrastructure protection community. However, the diversity of cyber-physical systems means that the methods used to analyze system security must often be reinvented. The issues of securing the physical assets of a system, the electronics that control the system and the interfaces between the cyber and physical components of the system require a number of security tools. Of particular interest is preventing an attacker from exploiting nondeducibility-secure information flows to hide an attack or the source of an attack. This potentially enables the attacker to interrupt system availability.
This chapter presents an algorithm that formalizes the steps taken to design and test the security of a cyber-physical system. The algorithm leverages information flow security techniques to secure physical assets, cyber assets and the boundaries between security domains.
Recommended Citation
G. W. Howser, "Using Information Flow Methods to Secure Cyber-Physical Systems," IFIP Advances in Information and Communication Technology, vol. 466, pp. 185 - 205, Springer New York LLC, Mar 2015.
The definitive version is available at https://doi.org/10.1007/978-3-319-26567-4_12
Meeting Name
9th IFIP 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2015 (2015: Mar. 16-18, Arlington, VA)
Department(s)
Computer Science
Keywords and Phrases
Cyber-physical systems; Information flow security; Nondeducibility
International Standard Book Number (ISBN)
978-3-319-26566-7; 978-3-319-26567-4
International Standard Serial Number (ISSN)
1868-4238; 1868-422X
Document Type
Article - Conference proceedings
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2015 International Federation for Information Processing (IFIP), All rights reserved.