Demo Abstract: Analysing CPS Security with Falsification on the Microsoft Flight Simulator

Tanmay Khandait, Aniruddh Chandratre, Walstan Baptista, Giulia Pedrielli, Georgios Fainekos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In the paper titled " Stealthy attacks formalized as STL formulas for Falsification of CPS Security", we investigate a broad class of attacks on the sensor and actuation blocks in the form of additive perturbation that impacts the measurement and control, respectively. In this demo, we demonstrate the usage of our framework and the underlying technologies along with a case study on aviation systems using Microsoft Flight Simulator (MSFS).

Original languageEnglish (US)
Title of host publicationHSCC 2023 - Proceedings of the 26th ACM International Conference on Hybrid Systems
Subtitle of host publicationComputation and Control, Part of CPS-IoT Week
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9798400700330
DOIs
StatePublished - May 9 2023
Event26th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2023, Part of CPS-IoT Week 2023 - San Antonio, United States
Duration: May 10 2023May 12 2023

Publication series

NameHSCC 2023 - Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control, Part of CPS-IoT Week

Conference

Conference26th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2023, Part of CPS-IoT Week 2023
Country/TerritoryUnited States
CitySan Antonio
Period5/10/235/12/23

Keywords

  • CPS Security
  • Falsification
  • Signal Temporal Logic
  • Test Generation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Demo Abstract: Analysing CPS Security with Falsification on the Microsoft Flight Simulator'. Together they form a unique fingerprint.

Cite this