A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
PI-Calculus: A Theory of Mobile Processes
PI-Calculus: A Theory of Mobile Processes
Verification of Peer-to-peer Algorithms: A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Stealthy deception attacks on water SCADA systems
Proceedings of the 13th ACM international conference on Hybrid systems: computation and control
False data injection attacks against state estimation in electric power grids
ACM Transactions on Information and System Security (TISSEC)
A formal adversary capability model for SCADA environments
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |
Recently, studies have revealed new security issues in critical infrastructures, emphasizing the need for verification of security properties. Any mechanism to verify the security of such systems should merge the cyber and physical aspects in a unified way. This paper proposes a novel direction using process algebras to model and verify security properties within a cyber-physical system (CPS). Specifically, we adopt the π-calculus to perform security analysis of a representative CPS, an advanced electric smart grid. We present the verification of an information flow security property, non-deducibility, defined in terms of more discriminating behavioral equivalences available in π-calculus compared to other process algebras.