Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies
From MaRDI portal
Publication:2106413
DOI10.1007/S10626-022-00369-1zbMath1505.93002arXiv2102.06028OpenAlexW3198395630MaRDI QIDQ2106413
Stéphane Lafortune, Shoma Matsui
Publication date: 14 December 2022
Published in: Discrete Event Dynamic Systems (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2102.06028
supervisory controldistributed protocolsalternating bit protocoltransmission control protocolperson-in-the-middle attacks
Hierarchical systems (93A13) Discrete event control/observation systems (93C65) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Formulas for calculating supremal controllable and normal sublanguages
- On supremal languages of classes of sublanguages that arise in supervisor synthesis problems with partial observation
- A discrete event systems approach for protocol conversion
- Supervisory control and reactive synthesis: a comparative introduction
- Detection and mitigation of classes of attacks in supervisory control systems
- Supervisory control of discrete-event systems
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
- Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems
- Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies
- Synthesis of covert actuator attackers for free
- Supervisory control of discrete-event systems under attacks
- Synthesis of Maximally Permissive Supervisors for Partially-Observed Discrete-Event Systems
- Introduction to Discrete Event Systems
- Synthesis of Supervisors Robust Against Sensor Deception Attacks
This page was built for publication: Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies