About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

The Cyber-Physical Attacker

From

Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark2

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to.

In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.

Language: English
Publisher: Springer
Year: 2012
Pages: 347-356
Proceedings: 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)International Conference on Computer Safety, Reliability, and Security
Series: Lecture Notes in Computer Science
Journal subtitle: Safecomp 2012 Workshops: Sassur, Ascoms, Desec4lcci, Ercim/ewics, Iwde Magdeburg, Germany, September 25-28, 2012 Proceedings
ISBN: 3642336744 , 3642336752 , 9783642336744 and 9783642336751
ISSN: 03029743
Types: Conference paper
DOI: 10.1007/978-3-642-33675-1_31

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis