Runtime integrity for cyberphysical infrastructures

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cyber-physical systems integrate cyber capabilities (e.g., communications and computing) with physical devices (e.g., sensors, actuators and control processing units). Many of these systems support safety-critical applications such as electric power grids, water distribution systems and transportation systems. Failures of these systems can cause irreparable damage to equipment and injury or death to humans. While most of the efforts to protect the systems have focused on reliability, there are urgent concerns regarding malicious attacks. Trusted computing is a security paradigm that enables platforms to enforce the integrity of execution targets (code and data). However, protection under this paradigm is restricted to static threats. This chapter proposes a dynamic framework that addresses runtime integrity threats that target software programs in cyber-physical systems. It is well known that the attack surface of a multi-functional program (Swiss-army knife) can be much larger than the sum of the surfaces of its single-function components (e.g., the composition of programs that are secure in isolation is not necessarily secure). The proposed framework addresses this issue using calibration techniques that constrain the functionality of programs to the strict specifications of the cyber-physical application, thus steering execution flow away from the attack surface. Integrity is assured by verifying the calibration, while the burden of validation rests with system designers. The effectiveness of the approach is demonstrated by presenting a prototype for call integrity.

References Powered by Scopus

The Byzantine Generals Problem

4246Citations
N/AReaders
Get full text

Universally composable security: A new paradigm for cryptographic protocols

2175Citations
N/AReaders
Get full text

The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)

1094Citations
N/AReaders
Get full text

Cited by Powered by Scopus

DEDA: An algorithm for early detection of topology attacks in the internet of things

12Citations
N/AReaders
Get full text

A conceptural framework to federate testbeds for cybersecurity

2Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Jenkins, J., & Burmester, M. (2015). Runtime integrity for cyberphysical infrastructures. In IFIP Advances in Information and Communication Technology (Vol. 466, pp. 153–167). Springer New York LLC. https://doi.org/10.1007/978-3-319-26567-4_10

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

78%

Professor / Associate Prof. 2

22%

Readers' Discipline

Tooltip

Computer Science 4

44%

Engineering 2

22%

Psychology 2

22%

Chemistry 1

11%

Save time finding and organizing research with Mendeley

Sign up for free