-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Paper Discussion 8a: Preserving Physical Safety Under Cyber Attacks #67
Comments
Reviewer: Akinori Kahata
|
Reviewer: Lily Shpak Problem Being SolvedThis paper is attempting to solve the vulnerabilities associated with having cyber-physical systems. A lot of malicious actors use vulnerabilities in the software to attack physical systems. This means putting the system out of zone that is considered its admissible states Main ContributionsThe authors of this paper try to solve this problem by creating a secure execution interval or SEI. SEIs make it so that every cycle the system checks the state of the physical system to make sure that it is still in admissible state. The authors state that this system will be able to dynamically react to a change in the state that would make the system to no longer be admissible. Questions
Critiques
|
Reviewer: Sean McBride Review Type: Critical Review Problem Being Solved:How can the baseline safety of the physical plant of a cyber-physical system be preserved even when the software is fully-compromised? Main Contributions:
Questions:
Critiques:
|
Reviewer: Becky Shanley Problem Being Solved Main Contributions Questions
|
Reviewer: Alvaro Albero Problem being solvedCyber-physical systems (CPS) require increased security measures then other systems as the damaged caused by compromising them can be higher due to their physical characteristics. In this paper the authors demonstrate a way to ensure safety in CPS. Main ContributionsLeveraging the fact that due to inertia an attacker with full control of a system cannot destabilize it instantly, the authors develop a solution to recover control of the system within a secure period of time. First, they design an analytical method to estimate the window of time an attacker would need to damage the system. Second, they implement a system reset that is periodically executed within that period of time or an alternative that uses trusted execution environments (TEE). Finally, they test their solution in a prototype implementation. Questions
|
Reviewer: Graham Schock Problem Being Solved Contributions Questions
Critiques
|
Reviewer: Henry JaenschReview Type: Critical ReviewProblem Being SolvedAttacks against Cyber Physical Systems have the opportunity to cause physical damage to systems like plants. While there are other attack vectors this paper attempts to address attacks that aim to cause physical damage to the system. Main ContributionsThis paper recognizes that CPSs have consistent physical properties that can allow software a window of time to clean itself before physical damage occurs. Any attacks on a CPS will take a certain time T to cause physical damage. This paper proposes two solutions that use the knowledge of this time T to identify and correct errors before physical damage is done. Questions
Critiques
|
Reviewer: Gregor PeachReview Type: Critical ReviewProblem Being SolvedWhen a cyber physical system has a problem, it is not only the software that is affected, it is also the hardware and the real world. This magnifies the effect of attacks, leading to damage to people and/or property. ContributionsThis paper purposes a system based on "safe states" and timers. If you're in a "safe state" then you have $N seconds/steps before you crash. If we set a timer for $N - restart time as soon as you leave a safe state, and then restart then, we can ensure the system is always working right. (Assuming we can prevent the program from halting the restart.) That is a very simplified view of the contribution of the paper. Questions
Critiques
|
Reviewer: Pat Cody Problem Being SolvedWhen a cyber-physical system is compromised, it carries the risk of damaging the plant, environment, and humans. Normally, these systems are designed to mitigate and prevent intrusions, but there will always be an unforeseen vulnerability, especially when connected to the internet. Main ContributionsThis paper contributes a formal guarantee of a system's baseline safety by creating the notion of Secure Execution Intervals (SEI), a technique to prevent end-point devices from causing physical damage to a plant. Even if a device is compromised, the attacker won't have enough time to cause any physical harm before the next interval. SEI works either via restarts, or using a Trusted Execution Environment (TEE). Questions
|
Reviewer: Ryan FiskReview Type: ComprehensionProblemRecent attacks on cyber-physical systems have shown that software vulnerabilities can be leveraged to cause physical harm to those systems. The ability to cause physical damage creates a risk to human safety, and connecting these systems to the internet will only make the problem worse. ContributionThis paper demonstrates a way to preserve the physical functionality of the embedded system during a cyber attack using secure execution intervals. This method prevents an attacker from having control of the system for long enough to cause any physical damage. Questions
|
Please add all comprehensive and critical reviews below
Notable Questions
Still updating
The text was updated successfully, but these errors were encountered: