Cyber-physical systems hardware security vulneabilities

: pp. 170 - 177
Sholohon Y.

Національний університет “Львівська політехніка”, кафедра електронних обчислювальних машин

The main methods of protecting cyber physical systems are described in this paper. The most important hardware security tasks were noticed. Analyzed staged of cyber physical systems on which systems is the most vulnerable.

1. Baheti R. and Gill H. Cyber-physical systems. The Impact of Control Technology. 2. Edward A. Lee and Sanjit A. Seshia. Introduction to Embedded Systems // A Cyber-Physical Systems Approach 2011. 3. Mohammed M. Farag, Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware // Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering, 2012 Blacksburg, Virginia 4. Abhishek Gupta, Mohit Kumar, Future of all technologies // The Cloud and Cyber Physical Systems: International journal of enhanced Lviv research in science technology & engineering – 2013. 5. Мельник А. О. Кіберфізичні системи: проблеми створення та напрями розвитку. – Львів: Видавництво Львівської політехніки. – 2014. – С. 154–161. 6. Edward Ashford Lee, Sanjit Arunkumar Seshia, Introduction to Embedded Systems // A Cyber-Physical Systems Approach, Edition 1.5,, 2014 7. Krishna Kumar. Venkatasubramanian, Security solutions for cyber-physical systems: а Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy, Arizona State University December 2009. 8. Ying-Chang Liang, Hsiao-Hwa Chen, J. Mitola, P. Mahonen, R. Kohno, J.H. Reed, and L. Milstein. Guest editorial – cognitive radio: Theory and application. Selected Areas in Communications // IEEE Journal on, 26(1):1–4, January 2008. 9. Tehranipooret M. al. Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection, Springer International Publishing, Switzerland. – 2014. 10. Lerner L. W., Farag M. M. and Patterson C. D. Run-time prediction and preemption of configuration attacks on embedded process controllers // In Security of Internet of Things (SecurIT), 2012 First International Conference on, August 2012. 11. Bloom Gedare, Leontie Eugen. Handbook on Securing Cyber-Physical Critical Infrastructure, Elsevier Inc. 2012. 12. Alvaro A. Cardenas, Saurabh Amin, Challenges for securing cyber Physical Systems, Workshop on Future Directions in Cyber-physical Systems Security, DHS, 23, July, 2009.