PRECISE Center University of Pennsylvania      Duke University      University of Michigan      Penn Medicine      Penn Law
PRECISE  |   CIS Home  |   Penn Engineering  |   Penn
Security and Privacy-Aware Cyber-Physical Systems



Task 1: Platform Support

  • Cyber-based approaches
  • Prevention
  • Detection
    • sensor fusion
    • timing guaranteed accountability
  • Mitigation/Recovery
    • bounded time recovery
  • Forensics
    • secure synchronous provenance
    • compact evidence representation for CPS

Task 2: Security-Aware Control Design

Control-level strategies:

  1. Robust detection and identification of sensor/actuator attacks
    • Extend prior work on resilient state estimation with data-driven techniques
  2. Platform-aware resilient control systems
    • Incorporate knowledge about the platform (e.g., communication) into control algorithm
  3. Control-aware cryptography
    • Ensure necessary integrity of sensor data
    • Avoid unnecessary overhead

Task 3: Working with Sensitive Data

  • Theme: differential privacy for CPS
  • Focus areas:
    • Differential privacy in distributed systems
      • Exploit locality to improve privacy
      • Preliminary work: differentially private resource allocation
    • Privacy-related trade-offs in CPS
      • Stronger privacy can reduce control performance or decrease resilience to attacks
      • Security and privacy duality in control of CPS
      • Preliminary work: differentially private filtering

Task 4: Security assurance for CPS

  • Users resort to workarounds when they feel that security features of a system prevent them from doing their work
    • Workarounds defeat security protections
  • How can we predict workarounds and analyze their effects?
  • Approach:
    • Model potential workarounds as hazards and apply risk analysis
    • Incorporate users’ mental models into model-based design of CPS
PRECISE  |   CIS Home  |   Penn Engineering  |   Penn