当前位置: X-MOL 学术arXiv.cs.SY › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations
arXiv - CS - Systems and Control Pub Date : 2021-06-23 , DOI: arxiv-2106.12268
Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

In this paper, we consider the problem of synthesis of maximally permissive covert damage-reachable attackers in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system. The synthesized attacker needs to ensure both the damage-reachability and the covertness against all the supervisors which are consistent with the given set of observations. There is a gap between the de facto maximal permissiveness, assuming the model of the supervisor is known, and the maximal permissiveness that can be attained with a limited knowledge of the model of the supervisor, from the adversary's point of view. We consider the setup where the attacker can exercise sensor replacement/deletion attacks and actuator enablement/disablement attacks. The solution methodology proposed in this work is to reduce the synthesis of maximally permissive covert damage-reachable attackers, given the model of the plant and the finite set of observations, to the synthesis of maximally permissive safe supervisors for certain transformed plant, which shows the decidability of the observation-assisted covert attacker synthesis problem. The effectiveness of our approach is illustrated on a water tank example adapted from the literature.

中文翻译:

通过观察综合最大许可的隐蔽攻击者对抗未知监督者

在本文中,我们考虑了最大允许的隐蔽损坏可达攻击者的合成问题,其中监督者的模型对对手来说是未知的,但对手已经记录了一个(前缀封闭的)有限的运行观察集的闭环系统。合成攻击者需要确保对所有监督者的损害可达性和隐蔽性,这与给定的观察集一致。从对手的角度来看,假设监管者的模型已知,事实上的最大许可与在监管者模型的有限知识下可以获得的最大许可之间存在差距。我们考虑攻击者可以执行传感器替换/删除攻击和执行器启用/禁用攻击的设置。在这项工作中提出的解决方案方法是减少最大许可的隐蔽损坏可达攻击者的综合,给定工厂模型和有限的观察集,到对某些转化工厂的最大许可安全监督者的综合,这表明观察辅助隐蔽攻击者综合问题的可判定性。我们的方法的有效性在一个改编自文献的水箱示例中得到了说明。对某些转化工厂的最大许可安全监督者的综合,这表明了观察辅助的隐蔽攻击者综合问题的可判定性。我们的方法的有效性在一个改编自文献的水箱示例中得到了说明。对某些转化工厂的最大许可安全监督者的综合,这表明了观察辅助的隐蔽攻击者综合问题的可判定性。我们的方法的有效性在一个改编自文献的水箱示例中得到了说明。
更新日期:2021-06-25
down
wechat
bug