scholarly journals Doping Tests for Cyber-physical Systems

2021 ◽  
Vol 31 (3) ◽  
pp. 1-27
Author(s):  
Sebastian Biewer ◽  
Pedro R. D’argenio ◽  
Holger Hermanns

The software running in embedded or cyber-physical systems is typically of proprietary nature, so users do not know precisely what the systems they own are (in)capable of doing. Most malfunctionings of such systems are not intended by the manufacturer, but some are, which means these cannot be classified as bugs or security loopholes. The most prominent examples have become public in the diesel emissions scandal, where millions of cars were found to be equipped with software violating the law, altogether polluting the environment and putting human health at risk. The behaviour of the software embedded in these cars was intended by the manufacturer, but it was not in the interest of society, a phenomenon that has been called software doping . Due to the unavailability of a specification, the analysis of doped software is significantly different from that for buggy or insecure software and hence classical verification and testing techniques have to be adapted. The work presented in this article builds on existing definitions of software doping and lays the theoretical foundations for conducting software doping tests, so as to enable uncovering unethical manufacturers. The complex nature of software doping makes it very hard to effectuate doping tests in practice. We explain the main challenges and provide efficient solutions to realise doping tests despite this complexity.


2017 ◽  
Vol 02 (03) ◽  
pp. 1750013 ◽  
Author(s):  
Hong Chen

Cyber-Physical System (CPS) is a kind of large-scale and networked system that has drawn much attention in academia recently. Existing studies provide the extent for CPS research, but a systematic and extensive review of recent research on CPS is missing. Accordingly, this paper reviews 83 papers regarding theoretical foundations for CPS from 2012 to 2017 in the Scopus database aiming to provide scholars and practitioners with a comprehensive overview. The selected papers are grouped into 10 research categories. The contents of the papers in each research category are summarized. The challenges and research trends are illustrated as well.



2019 ◽  
Vol 38 (1) ◽  
pp. 95-104 ◽  
Author(s):  
Caiming Zhang ◽  
Xiaojun Xu ◽  
Hong Chen

Purpose The purpose of this paper is to review the current research on theoretical foundations and applications for CPS from 2017 to 2019 including the applications in library. Design/methodology/approach This paper is designed in six parts as Introduction, Literature review, Theoretical foundations of CPS, Applications of CPS, CPS’s application in library and Conclusion. The authors review 70 papers and classify them as the above six parts. The authors collected 70 papers from 2017 to 2019 in the academic databases. Findings This paper reviews 70 papers regarding theoretical foundations and applications for CPS from 2017 to 2019 in the academic databases aiming to provide scholars and practitioners with a comprehensive overview. The contents of the papers in each research category are summarized from theoretical foundations and applications including the CPS applications in library. Originality/value A main contribution of this review paper is that it summarizes the current state-of-the-art theoretical foundations and applications for CPS and in libraries systematically.



Systems ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 21 ◽  
Author(s):  
Bryan Carter ◽  
Stephen Adams ◽  
Georgios Bakirtzis ◽  
Tim Sherburne ◽  
Peter Beling ◽  
...  

Despite “cyber” being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.



Author(s):  
Yu. MELESHKO

The article analyzes the industrial policy of Germany, called Industry 4.0, which is based on the creation of a new type of industrial production thanks to cyber-physical systems. The theoretical foundations of Industry 4.0 are reviewed, the transformation of the goals and methods of implementation of the project Industry 4.0 over five years is shown, and the practical results obtained are characterized. This made it possible to identify the theoretical and methodological properties of Industry 4.0 as the industrial policy of Germany, due to the specific political and socio-economic factors prevailing in the country, and also to show the consequences of the impossibility of reconciling the interests of competing economic entities without political will



Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.



Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.



Sign in / Sign up

Export Citation Format

Share Document