Stealthy attacks formalized as STL formulas for Falsification of CPS Security
DOI10.1145/3575870.3587122OpenAlexW4375852646MaRDI QIDQ6202097
Giulia Pedrielli, Unnamed Author, Unnamed Author, Unnamed Author, Georgios E. Fainekos
Publication date: 21 February 2024
Published in: Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/3575870.3587122
Formal languages and automata (68Q45) Specification and verification (program logics, model checking, etc.) (68Q60) Control/observation systems governed by functional relations other than differential equations (such as hybrid and switching systems) (93C30)
Cites Work
- Unnamed Item
- Robustness of temporal logic specifications for continuous-time signals
- Effective hybrid system falsification using Monte Carlo tree search guided by QB-robustness
- Efficient global optimization of expensive black-box functions
- The design and analysis of computer experiments.
- Secure Estimation in the Presence of Integrity Attacks
- Monte-carlo techniques for falsification of temporal properties of non-linear hybrid systems
- S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- Simulation-Based Approaches for Verification of Embedded Control Systems: An Overview of Traditional and Advanced Modeling, Testing, and Verification Techniques
- Robust Satisfaction of Temporal Logic over Real-Valued Signals
- Falsification of LTL Safety Properties in Hybrid Systems
- Falsification of cyber-physical systems with robustness-guided black-box checking
- Test Coverage for Continuous and Hybrid Systems
This page was built for publication: Stealthy attacks formalized as STL formulas for Falsification of CPS Security