Skip to main content

Showing 1–15 of 15 results for author: Teixeira, A M H

.
  1. arXiv:2403.17861  [pdf, other

    eess.SY

    Stealthy Deactivation of Safety Filters

    Authors: Daniel Arnström, André M. H. Teixeira

    Abstract: Safety filters ensure that only safe control actions are executed. We propose a simple and stealthy false-data injection attack for deactivating such safety filters; in particular, we focus on deactivating safety filters that are based on control-barrier functions. The attack injects false sensor measurements to bias state estimates to the interior of a safety region, which makes the safety filter… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: ECC24

  2. arXiv:2312.04845  [pdf, other

    eess.SY math.OC

    Data-Driven Identification of Attack-free Sensors in Networked Control Systems

    Authors: Sribalaji C. Anand, Michelle S. Chong, André M. H. Teixeira

    Abstract: This paper proposes a data-driven framework to identify the attack-free sensors in a networked control system when some of the sensors are corrupted by an adversary. An operator with access to offline input-output attack-free trajectories of the plant is considered. Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online. We also provide ne… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Conference submission

  3. arXiv:2308.16639  [pdf, other

    eess.SY

    Security Allocation in Networked Control Systems under Stealthy Attacks

    Authors: Anh Tung Nguyen, André M. H. Teixeira, Alexander Medvedev

    Abstract: This paper considers the problem of security allocation in a networked control system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary selects a single vertex on which to conduct a stealthy data injection attack with the purpose of maximally disrupting a distant target vertex while remaining undetected. Defense resources ag… ▽ More

    Submitted 2 April, 2024; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: 12 pages, 3 figures, and 1 table, journal submission

  4. Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks

    Authors: Anh Tung Nguyen, Sribalaji C. Anand, André M. H. Teixeira, Alexander Medvedev

    Abstract: This paper proposes a game-theoretic method to address the problem of optimal detector placement in a networked control system under cyber-attacks. The networked control system is composed of interconnected agents where each agent is regulated by its local controller over unprotected communication, which leaves the system vulnerable to malicious cyber-attacks. To guarantee a given local performanc… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: 7 pages, 4 figures, accepted to IFAC 2023

  5. Risk-based Security Measure Allocation Against Injection Attacks on Actuators

    Authors: Sribalaji C. Anand, André M. H. Teixeira

    Abstract: This article considers the problem of risk-optimal allocation of security measures when the actuators of an uncertain control system are under attack. We consider an adversary injecting false data into the actuator channels. The attack impact is characterized by the maximum performance loss caused by a stealthy adversary with bounded energy. Since the impact is a random variable, due to system unc… ▽ More

    Submitted 11 August, 2023; v1 submitted 4 April, 2023; originally announced April 2023.

    Comments: Accepted to IEEE Open Journal of Control Systems (OJ-CSYS)

  6. Privacy and Security in Network Controlled Systems via Dynamic Masking

    Authors: Mohamed Abdalmoaty, Sribalaji C. Anand, André M. H. Teixeira

    Abstract: In this paper, we propose a new architecture to enhance the privacy and security of networked control systems against malicious adversaries. We consider an adversary which first learns the system dynamics (privacy) using system identification techniques, and then performs a data injection attack (security). In particular, we consider an adversary conducting zero-dynamics attacks (ZDA) which maximi… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  7. A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks

    Authors: Anh Tung Nguyen, Sribalaji C. Anand, André M. H. Teixeira

    Abstract: This paper proposes a game-theoretic approach to address the problem of optimal sensor placement against an adversary in uncertain networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected performance vertex, we consider a detector, with uncertain system knowledge, that selects another vertex on which to… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: 8 pages, 3 figues, Accepted to the 61st Conference on Decision and Control, Cancun, December 2022

  8. Risk assessment and optimal allocation of security measures under stealthy false data injection attacks

    Authors: Sribalaji C. Anand, André M. H. Teixeira, Anders Ahlén

    Abstract: This paper firstly addresses the problem of risk assessment under false data injection attacks on uncertain control systems. We consider an adversary with complete system knowledge, injecting stealthy false data into an uncertain control system. We then use the Value-at-Risk to characterize the risk associated with the attack impact caused by the adversary. The worst-case attack impact is characte… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: Accepted for publication at 6th IEEE Conference on Control Technology and Applications (CCTA). arXiv admin note: substantial text overlap with arXiv:2106.07071

  9. arXiv:2205.14001  [pdf, other

    math.OC eess.SY

    A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems

    Authors: Anh Tung Nguyen, André M. H. Teixeira, Alexander Medvedev

    Abstract: This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for detecting cyber-attacks in networked control systems. The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector. Given a protected target vertex, the detector places a sensor at a single vertex to monitor the system and detect the presence of the adv… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: 6 pages, 6 figures, 1 table, accepted to the 9th IFAC Conference on Networked Systems, Zurich, July 2022

  10. Risk-averse controller design against data injection attacks on actuators for uncertain control systems

    Authors: Sribalaji C. Anand, André M. H. Teixeira

    Abstract: In this paper, we consider the optimal controller design problem against data injection attacks on actuators for an uncertain control system. We consider attacks that aim at maximizing the attack impact while remaining stealthy in the finite horizon. To this end, we use the Conditional Value-at-Risk to characterize the risk associated with the impact of attacks. The worst-case attack impact is cha… ▽ More

    Submitted 28 February, 2022; originally announced March 2022.

    Comments: Accepted for publication to the 2022 American Control Conference

  11. Design of multiplicative watermarking against covert attacks

    Authors: Alexander J. Gallo, Sribalaji C. Anand, André M. H. Teixeira, Riccardo M. G. Ferrari

    Abstract: This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output l2-gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control prob… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control

    Journal ref: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of

  12. Stealthy Cyber-Attack Design Using Dynamic Programming

    Authors: Sribalaji C. Anand, André M. H. Teixeira

    Abstract: This paper addresses the issue of data injection attacks on control systems. We consider attacks which aim at maximizing system disruption while staying undetected in the finite horizon. The maximum possible disruption caused by such attacks is formulated as a non-convex optimization problem whose dual problem is a convex semi-definite program. We show that the duality gap is zero using S-lemma. T… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: Accepted to the Conference on Decision and Control 2021

  13. Risk Assessment of Stealthy Attacks on Uncertain Control Systems

    Authors: Sribalaji C. Anand, André M. H. Teixeira, Anders Ahlén

    Abstract: In this article, we address the problem of risk assessment of stealthy attacks on uncertain control systems. Considering data injection attacks that aim at maximizing impact while remaining undetected, we use the recently proposed output-to-output gain to characterize the risk associated with the impact of attacks under a limited system knowledge attacker. The risk is formulated using a well-estab… ▽ More

    Submitted 20 February, 2022; v1 submitted 13 June, 2021; originally announced June 2021.

  14. From Control System Security Indices to Attack Identifiability

    Authors: Henrik Sandberg, André M. H. Teixeira

    Abstract: In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The generalized index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbance… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

    Comments: Paper presented at the Science of Security for Cyber-Physical Systems Workshop (SoSCYPS) at CPS Week 2016, Vienna, Austria

  15. arXiv:1402.4031  [pdf, other

    cs.GT eess.SY math.OC

    Estimation with Strategic Sensors

    Authors: Farhad Farokhi, Andre M. H. Teixeira, Cedric Langbort

    Abstract: We introduce a model of estimation in the presence of strategic, self-interested sensors. We employ a game-theoretic setup to model the interaction between the sensors and the receiver. The cost function of the receiver is equal to the estimation error variance while the cost function of the sensor contains an extra term which is determined by its private information. We start by the single sensor… ▽ More

    Submitted 24 June, 2015; v1 submitted 17 February, 2014; originally announced February 2014.

    Comments: Results are generalized, illustrative examples are added, and the literature review is improved