Stealthy attacks formalized as STL formulas for Falsification of CPS Security
DOI10.1145/3575870.3587122OpenAlexW4375852646MaRDI QIDQ6202097FDOQ6202097
Authors: Giulia Pedrielli, Georgios E. Fainekos
Publication date: 21 February 2024
Published in: Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/3575870.3587122
Formal languages and automata (68Q45) Specification and verification (program logics, model checking, etc.) (68Q60) Control/observation systems governed by functional relations other than differential equations (such as hybrid and switching systems) (93C30)
Cites Work
- Efficient global optimization of expensive black-box functions
- The design and analysis of computer experiments.
- Robustness of temporal logic specifications for continuous-time signals
- An inverted pendulum on a fixed and movable base
- Falsification of LTL Safety Properties in Hybrid Systems
- Secure Estimation in the Presence of Integrity Attacks
- Robust satisfaction of temporal logic over real-valued signals
- S-TaLiRo: a tool for temporal logic falsification for hybrid systems
- Test Coverage for Continuous and Hybrid Systems
- Simulation-Based Approaches for Verification of Embedded Control Systems: An Overview of Traditional and Advanced Modeling, Testing, and Verification Techniques
- Effective hybrid system falsification using Monte Carlo tree search guided by QB-robustness
- Monte-Carlo techniques for falsification of temporal properties of non-linear hybrid systems
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- Falsification of cyber-physical systems with robustness-guided black-box checking
This page was built for publication: Stealthy attacks formalized as STL formulas for Falsification of CPS Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6202097)