TY - GEN
T1 - A Testing Based Approach for Security Analysis of Smart Semiconductor Systems
AU - Dodge, Robert
AU - Pedrielli, Giulia
AU - Jevtić, Petar
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Digital factories have been recognized as a paradigm with considerable promise for improving manufacturing performance. Digital Twins have emerged as a powerful tool to improve control performance for large-scale smart manufacturing systems. We argue that DT-based smart factories are vulnerable to attacks that use the DT to damage the system while remaining undetectable, specifically in high-cost processes, where DT technologies are more likely to be deployed. As an instructive example, we look into smart semiconductor processes with focus on photolithography. To this end, we formulate a static optimization problem to maximize the damage of a cyber-attack against a photolithography digital twin that minimizes detectability to the process controller. Results demonstrate that this problem formulation provides attack policies that successfully reduce the throughput of the system at trade off of increased detectability to a common process control technique. Results encourage more research in the domain, especially to face scalability and policy-like solutions.
AB - Digital factories have been recognized as a paradigm with considerable promise for improving manufacturing performance. Digital Twins have emerged as a powerful tool to improve control performance for large-scale smart manufacturing systems. We argue that DT-based smart factories are vulnerable to attacks that use the DT to damage the system while remaining undetectable, specifically in high-cost processes, where DT technologies are more likely to be deployed. As an instructive example, we look into smart semiconductor processes with focus on photolithography. To this end, we formulate a static optimization problem to maximize the damage of a cyber-attack against a photolithography digital twin that minimizes detectability to the process controller. Results demonstrate that this problem formulation provides attack policies that successfully reduce the throughput of the system at trade off of increased detectability to a common process control technique. Results encourage more research in the domain, especially to face scalability and policy-like solutions.
UR - http://www.scopus.com/inward/record.url?scp=85185386807&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85185386807&partnerID=8YFLogxK
U2 - 10.1109/WSC60868.2023.10408730
DO - 10.1109/WSC60868.2023.10408730
M3 - Conference contribution
AN - SCOPUS:85185386807
T3 - Proceedings - Winter Simulation Conference
SP - 2286
EP - 2297
BT - 2023 Winter Simulation Conference, WSC 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 Winter Simulation Conference, WSC 2023
Y2 - 10 December 2023 through 13 December 2023
ER -