Stealthy deception attacks for cyber-physical systems

Rômulo Meira Góes, Eunsuk Kang, Raymond Kwong, Stéphane Lafortune

Research output: Chapter in Book/Report/Conference proceedingConference contribution

65 Scopus citations


We study the security of Cyber-Physical Systems (CPS) in the context of the supervisory control layer. Specifically, we propose a general model of a CPS attacker in the framework of Discrete Event Systems (DES) and investigate the problem of synthesizing an attack strategy for a given controlled system. Our model captures a class of deception attacks, where the attacker has the ability to modify a subset of sensor readings and mislead the supervisor, with the goal of inducing the system into an undesirable state. We introduce a new type of a bipartite transition structure, called Insertion-Deletion Attack structure (IDA), to capture the game-like interaction between the supervisor and the environment (which includes the system and attacker). This structure is a discrete transition system that embeds information about all possible attacker's stealthy actions, and all states (some possibly unsafe) that become reachable as a result of those actions. We present a procedure for the construction of the IDA and discuss its properties. Based on the IDA, we discuss the characterization of successful stealthy attacks, i.e., attacks that avoid detection from the supervisor and cause damage to the system.

Original languageEnglish (US)
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages7
ISBN (Electronic)9781509028733
StatePublished - Jun 28 2017
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: Dec 12 2017Dec 15 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017


Other56th IEEE Annual Conference on Decision and Control, CDC 2017

All Science Journal Classification (ASJC) codes

  • Decision Sciences (miscellaneous)
  • Industrial and Manufacturing Engineering
  • Control and Optimization


Dive into the research topics of 'Stealthy deception attacks for cyber-physical systems'. Together they form a unique fingerprint.

Cite this