About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Security Games for Cyber-Physical Systems

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Language-Based Technology, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

The development of quantitative security analyses that consider both active attackers and reactive defenders is a main challenge in the design of trustworthy Cyber-Physical Systems. We propose a game-theoretic approach where it is natural to model attacker’s and defender’s actions explicitly, associating costs to attacks and countermeasures.

Cost considerations enable to contrast different strategies on the basis of their effectiveness and efficiency, paving the way to a multi-objective notion of optimality. Moreover, the framework allows expressing the probabilistic nature of the environment and of the attack detection process. Finally, a solver is presented to compute strategies and their costs, resorting to a recent combination of strategy iteration with linear programming.

Language: English
Publisher: Springer
Year: 2013
Pages: 17-32
Proceedings: 18th Nordic Conference on Secure IT Systems (NordSec 2013)Nordic Conference on Secure IT Systems
Series: Lecture Notes in Computer Science
Journal subtitle: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ISBN: 3642414877 , 3642414885 , 9783642414879 and 9783642414886
ISSN: 03029743
Types: Conference paper
DOI: 10.1007/978-3-642-41488-6_2

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis