Skip to main content

Showing 1–42 of 42 results for author: Murguia, C

.
  1. arXiv:2406.06116  [pdf, other

    eess.SY

    Model Updating for Nonlinear Systems with Stability Guarantees

    Authors: Farhad Ghanipoor, Carlos Murguia, Peyman Mohajerin Esfahani, Nathan van de Wouw

    Abstract: To improve the predictive capacity of system models in the input-output sense, this paper presents a framework for model updating via learning of modeling uncertainties in locally (and thus also in globally) Lipschitz nonlinear systems. First, we introduce a method to extend an existing known model with an uncertainty model so that stability of the extended model is guaranteed in the sense of set… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2310.20568

  2. arXiv:2404.05361  [pdf, ps, other

    eess.SY cs.CR

    Optimal Controller Realizations against False Data Injections in Cooperative Driving

    Authors: Mischa Huisman, Carlos Murguia, Erjen Lefeber, Nathan van de Wouw

    Abstract: To enhance the robustness of cooperative driving to cyberattacks, we study a controller-oriented approach to mitigate the effect of a class of False-Data Injection (FDI) attacks. By reformulating a given dynamic Cooperative Adaptive Cruise Control (CACC) scheme (the base controller), we recognize that the base controller can be represented by a class of new but equivalent controllers (base control… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: 7 pages, 4 figures, preprint 2024 Conference on Decision and Control in Milano

  3. arXiv:2403.04485  [pdf, other

    cs.CR

    Privacy in Cloud Computing through Immersion-based Coding

    Authors: Haleh Hayati, Nathan van de Wouw, Carlos Murguia

    Abstract: Cloud computing enables users to process and store data remotely on high-performance computers and servers by sharing data over the Internet. However, transferring data to clouds causes unavoidable privacy concerns. Here, we present a synthesis framework to design coding mechanisms that allow sharing and processing data in a privacy-preserving manner without sacrificing data utility and algorithmi… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  4. arXiv:2402.15738  [pdf, other

    cs.CR eess.SY

    Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey

    Authors: Xinhao Yan, Guanzhong Zhou, Daniel E. Quevedo, Carlos Murguia, Bo Chen, Hailong Huang

    Abstract: Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks -- and often the first type before launching destructive integrity attacks -- are eavesdrop** attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A… ▽ More

    Submitted 24 February, 2024; originally announced February 2024.

    Comments: 16 pages, 5 figures, 4 tables

  5. arXiv:2310.20568  [pdf, other

    eess.SY

    Uncertainty Learning for LTI Systems with Stability Guarantees

    Authors: Farhad Ghanipoor, Carlos Murguia, Peyman Mohajerin Esfahani, Nathan van de Wouw

    Abstract: We present a framework for learning of modeling uncertainties in Linear Time Invariant (LTI) systems. We propose a methodology to extend the dynamics of an LTI (without uncertainty) with an uncertainty model, based on measured data, to improve the predictive capacity of the model in the input-output sense. The proposed framework guarantees stability of the extended model. To achieve this, two semi… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  6. arXiv:2307.15874  [pdf, ps, other

    eess.SY math.OC

    Resilient Controller Synthesis Against DoS Attacks for Vehicular Platooning in Spatial Domain

    Authors: Jian Gong, Carlos Murguia, Anggera Bayuwindra, **de Cao

    Abstract: This paper proposes a vehicular platoon control approach under Denial-of-Service (DoS) attacks and external disturbances. DoS attacks increase the service time on the communication network and cause additional transmission delays, which consequently increase the risk of rear-end collisions of vehicles in the platoon. To counter DoS attacks, we propose a resilient control scheme that exploits polyt… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  7. arXiv:2306.10925  [pdf, other

    eess.SY

    Attack-Resilient Design for Connected and Automated Vehicles

    Authors: Tianci Yang, Carlos Murguia, Dragan Nesic, Chau Yuen

    Abstract: By sharing local sensor information via Vehicle-to-Vehicle (V2V) wireless communication networks, Cooperative Adaptive Cruise Control (CACC) is a technology that enables Connected and Automated Vehicles (CAVs) to drive autonomously on the highway in closely-coupled platoons. The use of CACC technologies increases safety and the traffic throughput, and decreases fuel consumption and CO2 emissions.… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: text overlap with arXiv:2109.01553

  8. arXiv:2305.14036  [pdf, other

    eess.SY

    Robust Fault Estimators for Nonlinear Systems: An Ultra-Local Model Design

    Authors: Farhad Ghanipoor, Carlos Murguia, Peyman Mohajerin Esfahani, Nathan van de Wouw

    Abstract: This paper proposes a nonlinear estimator for the robust reconstruction of process and sensor faults for a class of uncertain nonlinear systems. The proposed fault estimation method augments the system dynamics with an ultra-local (in time) internal state-space representation (a finite chain of integrators) of the fault vector. Next, a nonlinear state observer is designed based on the known parts… ▽ More

    Submitted 10 June, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:2204.01455

  9. arXiv:2304.10359  [pdf, other

    math.OC eess.SY

    Secondary Controller Design for the Safety of Nonlinear Systems via Sum-of-Squares Programming

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of ensuring the safety of nonlinear control systems under adversarial signals. Using Lyapunov based reachability analysis, we first give sufficient conditions to assess safety, i.e., to guarantee that the states of the control system, when starting from a given initial set, always remain in a prescribed safe set. We consider polynomial systems with semi-algebraic safe sets.… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  10. arXiv:2304.02395  [pdf, ps, other

    eess.SY cs.CR

    Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries

    Authors: Mischa Huisman, Carlos Murguia, Erjen Lefeber, Nathan van de Wouw

    Abstract: Cooperative Adaptive Cruise Control (CACC) is a technology that allows groups of vehicles to form in automated, tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange information between vehicles. However, the use of communication networks brings security concerns as it exposes network access points that the adversary can exploit to disrupt the… ▽ More

    Submitted 7 September, 2023; v1 submitted 5 April, 2023; originally announced April 2023.

  11. arXiv:2303.17519  [pdf, other

    cs.CR cs.IT eess.SY

    Infinite Horizon Privacy in Networked Control Systems: Utility/Privacy Tradeoffs and Design Tools

    Authors: Haleh Hayati, Nathan van de Wouw, Carlos Murguia

    Abstract: We address the problem of synthesizing distorting mechanisms that maximize infinite horizon privacy for Networked Control Systems (NCSs). We consider stochastic LTI systems where information about the system state is obtained through noisy sensor measurements and transmitted to a (possibly adversarial) remote station via unsecured/public communication networks to compute control actions (a remote… ▽ More

    Submitted 27 July, 2023; v1 submitted 30 March, 2023; originally announced March 2023.

  12. arXiv:2212.00593  [pdf, other

    eess.SY

    Plug-and-Play Secondary Control for Safety of LTI Systems under Attacks

    Authors: Yankai Lin, Michelle S. Chong, Carlos Murguia

    Abstract: We consider the problem of controller design for linear time-invariant cyber-physical systems (CPSs) controlled via networks. Specifically, we adopt the set-up that a controller has already been designed to stabilize the plant. However, the closed loop system may be subject to actuator and sensor attacks. We first perform a reachability analysis to see the effect of potential attacks. To further e… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  13. arXiv:2211.11608  [pdf, other

    cs.CR

    Immersion and Invariance-based Coding for Privacy in Remote Anomaly Detection

    Authors: Haleh Hayati, Nathan van de Wouw, Carlos Murguia

    Abstract: We present a framework for the design of coding mechanisms that allow remotely operating anomaly detectors in a privacy-preserving manner. We consider the following problem setup. A remote station seeks to identify anomalies based on system input-output signals transmitted over communication networks. However, it is not desired to disclose true data of the system operation as it can be used to inf… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2211.03698

  14. arXiv:2211.06214  [pdf, other

    eess.SY

    Linear Fault Estimators for Nonlinear Systems: An Ultra-Local Model Design

    Authors: Farhad Ghanipoor, Carlos Murguia, Peyman Mohajerin Esfahani, Nathan van de Wouw

    Abstract: This paper addresses the problem of robust process and sensor fault reconstruction for nonlinear systems. The proposed method augments the system dynamics with an approximated internal linear model of the combined contribution of known nonlinearities and unknown faults -- leading to an approximated linear model in the augmented state. We exploit the broad modeling power of ultra-local models to ch… ▽ More

    Submitted 11 April, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2204.01455

  15. arXiv:2211.03698  [pdf, other

    eess.SY

    Privacy-Preserving Anomaly Detection in Stochastic Dynamical Systems: Synthesis of Optimal Gaussian Mechanisms

    Authors: Haleh Hayati, Carlos Murguia, Nathan van de Wouw

    Abstract: We present a framework for designing distorting mechanisms that allow remotely operating anomaly detectors while preserving privacy. We consider the problem setting in which a remote station seeks to identify anomalies using system input-output signals transmitted over communication networks. However, disclosing true data of the system operation is not desired as it can be used to infer private in… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 November, 2022; originally announced November 2022.

  16. arXiv:2204.02497  [pdf, other

    cs.LG cs.CR eess.SY

    Privacy-Preserving Federated Learning via System Immersion and Random Matrix Encryption

    Authors: Haleh Hayati, Carlos Murguia, Nathan van de Wouw

    Abstract: Federated learning (FL) has emerged as a privacy solution for collaborative distributed learning where clients train AI models directly on their devices instead of sharing their data with a centralized (potentially adversarial) server. Although FL preserves local data privacy to some extent, it has been shown that information about clients' data can still be inferred from model updates. In recent… ▽ More

    Submitted 7 September, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  17. arXiv:2204.01455  [pdf, other

    eess.SY

    Ultra Local Nonlinear Unknown Input Observers for Robust Fault Reconstruction

    Authors: Farhad Ghanipoor, Carlos Murguia, Peyman Mohajerin Esfahani, Nathan van de Wouw

    Abstract: In this paper, we present a methodology for actuator and sensor fault estimation in nonlinear systems. The method consists in augmenting the system dynamics with an approximated ultra-local model (a finite chain of integrators) for the fault vector and constructing a Nonlinear Unknown Input Observer (NUIO) for the augmented dynamics. Then, fault reconstruction is reformulated as a robust state est… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

  18. arXiv:2111.15307  [pdf, other

    eess.SY

    Gaussian Mechanisms Against Statistical Inference: Synthesis Tools

    Authors: Haleh Hayati, Carlos Murguia, Nathan van de Wouw

    Abstract: In this manuscript, we provide a set of tools (in terms of semidefinite programs) to synthesize Gaussian mechanisms to maximize privacy of databases. Information about the database is disclosed through queries requested by (potentially) adversarial users. We aim to keep part of the database private (private sensitive information); however, disclosed data could be used to estimate private informati… ▽ More

    Submitted 28 March, 2022; v1 submitted 30 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: text overlap with arXiv:2108.01755

  19. arXiv:2111.09396  [pdf, ps, other

    eess.SY

    Enforcing Safety under Actuator Attacks through Input Filtering

    Authors: Cédric Escudero, Carlos Murguia, Paolo Massioni, Eric Zamaï

    Abstract: Actuator injection attacks pose real threats to all industrial plants controlled through communication networks. In this manuscript, we study the possibility of constraining the controller output (i.e. the input to the actuators) by means of a dynamic filter designed to prevent reachability of dangerous plant states - preventing thus attacks from inducing dangerous states by tampering with the con… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  20. arXiv:2109.01553  [pdf, other

    eess.SY

    Risk Assessment for Connected Vehicles under Stealthy Attacks on Vehicle-to-Vehicle Networks

    Authors: Tianci Yang, Carlos Murguia, Chen Lv

    Abstract: Cooperative Adaptive Cruise Control (CACC) is an autonomous vehicle-following technology that allows groups of vehicles on the highway to form in tightly-coupled platoons. This is accomplished by exchanging inter-vehicle data through Vehicle-to-Vehicle (V2V) wireless communication networks. CACC increases traffic throughput and safety, and decreases fuel consumption. However, the surge of vehicle… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  21. arXiv:2108.01755  [pdf, ps, other

    cs.CR eess.SY

    Finite Horizon Privacy of Stochastic Dynamical Systems: A Synthesis Framework for Dependent Gaussian Mechanisms

    Authors: Haleh Hayati, Carlos Murguia, Nathan van de Wouw

    Abstract: We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dynamical systems. Information about the system state is obtained through sensor measurements. This data is transmitted to a remote station through an unsecured/public communication network. We aim to keep part of the system state private (a private output); however, because the network is unsecured, a… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

  22. arXiv:2106.10448  [pdf, other

    eess.SY

    A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks

    Authors: Tianci Yang, Carlos Murguia, Dragan Nešić, Chen Lv

    Abstract: Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of vehicles on the highway to form in closely-coupled automated platoons to increase highway capacity and safety, and decrease fuel consumption and CO2 emissions. The underlying mechanism behind CACC is the use of Vehicle-to-Vehicle (V2V) wireless communication networks to transmit acceleration commands to adja… ▽ More

    Submitted 19 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: text overlap with arXiv:2103.00883

  23. arXiv:2103.04579  [pdf, other

    eess.SY

    On Joint Reconstruction of State and Input-Output Injection Attacks for Nonlinear Systems

    Authors: Tianci Yang, Carlos Murguia, Chen Lv, Dragan Nesic, Chao Huang

    Abstract: We address the problem of robust state reconstruction for discrete-time nonlinear systems when the actuators and sensors are injected with (potentially unbounded) attack signals. Exploiting redundancy in sensors and actuators and using a bank of unknown input observers (UIOs), we propose an observer-based estimator capable of providing asymptotic estimates of the system state and attack signals un… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:1904.04237

  24. arXiv:2006.07063  [pdf, ps, other

    eess.SY

    Privacy Against Adversarial Classification in Cyber-Physical Systems

    Authors: Carlos Murguia, Paulo Tabuada

    Abstract: For a class of Cyber-Physical Systems (CPSs), we address the problem of performing computations over the cloud without revealing private information about the structure and operation of the system. We model CPSs as a collection of input-output dynamical systems (the system operation modes). Depending on the mode the system is operating on, the output trajectory is generated by one of these systems… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  25. arXiv:1910.13559  [pdf, ps, other

    eess.SY

    On Privacy of Dynamical Systems: An Optimal Probabilistic Map** Approach (Extended Preprint)

    Authors: Carlos Murguia, Iman Shames, Farhad Farokhi. Dragan Nesic, Vincent Poor

    Abstract: We address the problem of maximizing privacy of stochastic dynamical systems whose state information is released through quantized sensor data. In particular, we consider the setting where information about the system state is obtained using noisy sensor measurements. This data is quantized and transmitted to a remote station through a public/unsecured communication network. We aim at kee** the… ▽ More

    Submitted 21 January, 2021; v1 submitted 29 October, 2019; originally announced October 2019.

  26. arXiv:1906.00577  [pdf, ps, other

    eess.SY

    Information-Theoretic Privacy through Chaos Synchronization and Optimal Additive Noise

    Authors: Carlos Murguia, Iman Shames, Farhad Farokhi, Dragan Nesic

    Abstract: We study the problem of maximizing privacy of data sets by adding random vectors generated via synchronized chaotic oscillators. In particular, we consider the setup where information about data sets, queries, is sent through public (unsecured) communication channels to a remote station. To hide private features (specific entries) within the data set, we corrupt the response to queries by adding r… ▽ More

    Submitted 16 July, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

    Comments: arXiv admin note: text overlap with arXiv:1809.03133 by other authors

  27. arXiv:1904.04237  [pdf, ps, other

    eess.SY

    An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimation error (in the attack-free case), we propose an observer-based estimator that provides exponential… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1811.10159

  28. arXiv:1904.04236  [pdf, ps, other

    eess.SY

    A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals. For a large class of nonlinear plants and observers, we provide a general estimation scheme, built around the idea of sensor redundancy and multi-observer, capable of reconstructing the system state in spite of sensor atta… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1806.06484

  29. arXiv:1812.04168  [pdf, ps, other

    math.OC cs.CR eess.SY

    Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption

    Authors: Carlos Murguia, Farhad Farokhi, Iman Shames

    Abstract: This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method. To avoid overflow or underflow within the encryption domain, the state of the controller is reset periodically. A control design approach is presented to ensure stability and optimize performance of the closed-loop system with encry… ▽ More

    Submitted 20 June, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: Improved numerical example

  30. arXiv:1811.10159  [pdf, ps, other

    eess.SY

    An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nesic

    Abstract: We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks. Using a bank of Unknown Input Observers (UIOs), each observer leading to an exponentially stable estimation error in the attack-free case, we propose an estimator that provides exponential estimates of t… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

  31. arXiv:1809.03133  [pdf, ps, other

    eess.SY

    On Privacy of Quantized Sensor Measurements through Additive Noise

    Authors: Carlos Murguia, Iman Shames, Farhad Farokhi, Dragan Nesic

    Abstract: We study the problem of maximizing privacy of quantized sensor measurements by adding random variables. In particular, we consider the setting where information about the state of a process is obtained using noisy sensor measurements. This information is quantized and sent to a remote station through an unsecured communication network. It is desired to keep the state of the process private; howeve… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  32. arXiv:1809.01808  [pdf, other

    eess.SY

    Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint)

    Authors: Carlos Murguia, Iman Shames, Justin Ruths, Dragan Nesic

    Abstract: As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid being detected. In this manuscript, for a class of perturbed linear ti… ▽ More

    Submitted 3 June, 2019; v1 submitted 5 September, 2018; originally announced September 2018.

  33. arXiv:1806.06484  [pdf, ps, other

    eess.SY cs.CR

    A Multi-Observer Approach for Attack Detection and Isolation of Discrete-Time Nonlinear Systems

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nešić

    Abstract: We address the problem of attack detection and isolation for a class of discrete-time nonlinear systems under (potentially unbounded) sensor attacks and measurement noise. We consider the case when a subset of sensors is subject to additive false data injection attacks. Using a bank of observers, each observer leading to an Input-to-State Stable (ISS) estimation error, we propose two algorithms fo… ▽ More

    Submitted 2 January, 2019; v1 submitted 17 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: text overlap with arXiv:1805.04242

  34. arXiv:1805.04242  [pdf, ps, other

    eess.SP eess.SY

    A Robust Circle-criterion Observer-based Estimator for Discrete-time Nonlinear Systems in the Presence of Sensor Attacks and Measurement Noise

    Authors: Tianci Yang, Carlos Murguia, Margreta Kuijper, Dragan Nešić

    Abstract: We address the problem of robust state estimation of a class of discrete-time nonlinear systems with positive-slope nonlinearities when the sensors are corrupted by (potentially unbounded) attack signals and bounded measurement noise. We propose an observer-based estimator, using a bank of circle-criterion observers, which provides a robust estimate of the system state in spite of sensor attacks a… ▽ More

    Submitted 19 September, 2018; v1 submitted 11 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1806.06484

  35. arXiv:1710.11276  [pdf, ps, other

    eess.SY

    Synchronization in Networks of Diffusively Coupled Nonlinear Systems: Robustness Against Time-Delays

    Authors: Carlos Murguia, Henk Nijmeijer, Justin Ruths

    Abstract: In this manuscript, we study the problem of robust synchronization in networks of diffusively time-delayed coupled nonlinear systems. In particular, we prove that, under some mild conditions on the input-output dynamics of the systems and the network topology, there always exists a unimodal region in the parameter space (coupling strength versus time-delay), such that if they belong to this region… ▽ More

    Submitted 30 October, 2017; originally announced October 2017.

  36. arXiv:1710.06967  [pdf, ps, other

    eess.SY

    On Reachable Sets of Hidden CPS Sensor Attacks

    Authors: Carlos Murguia, Justin Ruths

    Abstract: For given system dynamics, observer structure, and observer-based fault/attack detection procedure, we provide mathematical tools -- in terms of Linear Matrix Inequalities (LMIs) -- for computing outer ellipsoidal bounds on the set of estimation errors that attacks can induce while maintaining the alarm rate of the detector equal to its attack-free false alarm rate. We refer to these sets to as hi… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

  37. arXiv:1710.04407  [pdf, ps, other

    eess.SY

    Characterization of Model-Based Detectors for CPS Sensor Faults/Attacks

    Authors: Carlos Murguia, Justin Ruths

    Abstract: A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying faulty/falsified sensor measurements. First, given the system dynamics, we derive tools for tuning the CUSUM procedure in the fault/attack free case to fulfill a desired detection performance (in terms of false alarm rate). We use the widely-used chi-squared fault/attack detection procedure as a benchmark to c… ▽ More

    Submitted 12 October, 2017; originally announced October 2017.

    Comments: Submitted to IEEE Transactions on Control Systems Technology

  38. arXiv:1710.02597  [pdf, other

    eess.SY math.DS math.OC

    A Comparison of Stealthy Sensor Attacks on Control Systems

    Authors: Navid Hashemi, Carlos Murguia, Justin Ruths

    Abstract: As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid detection. Here we show how the states of the system (in particular, t… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  39. arXiv:1710.02576  [pdf, other

    eess.SY math.DS math.OC

    Constraining Attacker Capabilities Through Actuator Saturation

    Authors: Sahand Hadizadeh Kafash, Jairo Giraldo, Carlos Murguia, Alvaro A. Cardenas, Justin Ruths

    Abstract: For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide too… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  40. arXiv:1710.02573  [pdf, other

    eess.SY math.DS math.OC

    Tuning Windowed Chi-Squared Detectors for Sensor Attacks

    Authors: Tunga R, Carlos Murguia, Justin Ruths

    Abstract: A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the performance of the windowed chi-squared detector. In particular, we characterize the state degradation that a class of attacks can induce to the syst… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

  41. arXiv:1708.04798  [pdf, other

    cs.CR

    Design-Time Quantification of Integrity in Cyber-Physical-Systems

    Authors: Eric Rothstein Morris, Carlos G. Murguia, Martín Ochoa

    Abstract: In a software system it is possible to quantify the amount of information that is leaked or corrupted by analysing the flows of information present in the source code. In a cyber-physical system, information flows are not only present at the digital level, but also at a physical level, and to and fro the two levels. In this work, we provide a methodology to formally analyse a Cyber-Physical System… ▽ More

    Submitted 16 August, 2017; originally announced August 2017.

  42. arXiv:1704.07597  [pdf, other

    q-fin.MF cs.LG cs.MA

    Learning Agents in Black-Scholes Financial Markets: Consensus Dynamics and Volatility Smiles

    Authors: Tushar Vaidya, Carlos Murguia, Georgios Piliouras

    Abstract: Black-Scholes (BS) is the standard mathematical model for option pricing in financial markets. Option prices are calculated using an analytical formula whose main inputs are strike (at which price to exercise) and volatility. The BS framework assumes that volatility remains constant across all strikes, however, in practice it varies. How do traders come to learn these parameters? We introduce natu… ▽ More

    Submitted 10 July, 2020; v1 submitted 25 April, 2017; originally announced April 2017.

    Comments: 19 pages, 3 figures

    MSC Class: physics.soc-ph