Menu:

News:

April 2014:
Our paper wins the Best Paper Award at ICCPS'2014!

January 2014:
Paper on robustness of attack-resilient state estimators accepted at ICCPS'2014, part of the CPSWeek!

December 2013:
Paper on resilient history-based sensor fusion accepted at HICONS'2014, part of the CPSWeek!

November 2013:
Paper on attack resilient sensor fusion accepted at DATE'14!

September 2013:
Miroslav Pajic is a program committee member at HiCoNS!

July 2013:
Paper accepted at CDC'13!

July 2013:
LandShark demonstration at the HACMS review


Project Overview:


Secure_CPS

Modern embedded control architectures have moved from isolated closed-loop control systems to open architectures, such as new automotive architectures with services that include remote diagnostics, code updates, and vehicle-to-vehicle communication. However, this shift has also introduced security vulnerabilities that are easily exploitable, since the current embedded systems have not been built with security in mind. An illustrative example are the recently exposed security vulnerabilities in present-day vehicles, which can be simply exploited by an attacker to disrupt the operation of a car by either disabling the vehicle or hijack it, giving the attacker the ability to control it instead.

The challenge of designing secure embedded-control systems has to be addressed on two levels. First, it is necessary to design attack resilient control schemes and architectures, capable of dealing with attacks on the environment of the controller, including attacks on sensors, actuators, and communication media. To utilize the knowledge of the system dynamics for attack detection and identification, we have to focus on new problems, such as sensor and controller fusion under attacks, detecting system attacks in the presence of noise and model uncertainty, and resilient control of nonlinear systems. On the other level, it is essential to ensure that the code generated for the resilient controller correctly implements the desired algorithm while preventing injection of malicious code into the controller itself. This can be achieved by providing a set of control and security code invariants that can be verified under a certain set of assumptions on the underlying computation/communication platform. In this case, the main challenges are in defining a suitable set of control invariants, along with formalisms that can be used to capture the platform assumptions.

Papers:

Reports:


Videos:

Attack-resilient Velocity Estimation on a Real Vehicle!

Attack-resilient state estimation on a Generic American Built Car (ABC). We illustrate performance of the proposed attack-resilient state estimator (from the ICCPS'14 paper) when GPS and/or encoder measurements are attacked on a real-vehicle.

Test I - uncut version

Test II - uncut version


Attack-resilient Cruise Control on the LansShark!

Experiments on the Black-I LandShark robot described in the ICCPS'14 paper. We illustrate performance of the proposed attack-resilient state estimator when used for Cruise Control on different surfaces/terrains. During the experiments we activate/deactivate the resilient state estimators, run different attacks on different sensors, save data, change the gains of the PID loop, and trim the vehicles. Trimming was necessary on the LandShark because the two sides of the vehicles are unbalanced and we are not controlling the steering of the vehicle.

Attack-resilient Cruise Control on Tiled Surface

Attack-resilient Cruise Control on Grass

Attack-resilient Cruise Control on Snow!

Attack-resilient Cruise Control on Grass with only a constant attack on the GPS

Additional tests of Attack-resilient Cruise Control on Tiled Surface

Additional tests of Attack-resilient Cruise Control on Grass


Attack-Resilient Fusion for Safety-Critical CPS

This video illustrates performance of the proposed attack-resilient sensor fusion algorithm when each sensor provides a set with all possible values for the true state of the measured variable (described in the paper). We recorded an experiment with the LandShark robot, in which the robot was driven straight and velocity was estimated by three sensors: left and right encoders and GPS. The input speed was set to 0.8 mph initially, before being raised to 1 mph. We introduced a maximal offset attack on the right encoder (see the paper for an explanation of the attack). We compared the performance of the abstract sensor fusion algorithm (with velocity measurements as input) for two communication schedules - Ascending and Descending, and showed that the size of the fusion interval under the Ascending schedule is never larger than that under Descending.