Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of.

Slides:



Advertisements
Similar presentations
Tintu David Joy. Agenda Motivation Better Verification Through Symmetry-basic idea Structural Symmetry and Multiprocessor Systems Mur ϕ verification system.
Advertisements

Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Lect.3 Modeling in The Time Domain Basil Hamed
Game-theoretic approach to the simulation checking problem Peter Bulychev Vladimir Zakharov Lomonosov Moscow State University.
Electronic Communications of the EASST Volume 21 (2009) Presented By: Ayush Khandelwal
Timed Automata.
Model Checker In-The-Loop Flavio Lerda, Edmund M. Clarke Computer Science Department Jim Kapinski, Bruce H. Krogh Electrical & Computer Engineering MURI.
February 21, 2008 Center for Hybrid and Embedded Software Systems Cyber-Physical Systems (CPS): Orchestrating networked.
1 Formal Methods in SE Qaisar Javaid Assistant Professor Lecture 05.
An Architecture-Based Approach to Self-Adaptive Software Presenters Douglas Yu-cheng Su Ajit G. Sonawane.
SE 555 Software Requirements & Specification1 Use-Case Modeling: Overview and Context.
The Rare Glitch Project: Verification Tools for Embedded Systems Carnegie Mellon University Pittsburgh, PA Ed Clarke, David Garlan, Bruce Krogh, Reid Simmons,
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
CS 711 Fall 2002 Programming Languages Seminar Andrew Myers 2. Noninterference 4 Sept 2002.
1 Formal Engineering of Reliable Software LASER 2004 school Tutorial, Lecture1 Natasha Sharygina Carnegie Mellon University.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
7/16/2015 3:58 AM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid ASU - Cyber Physical Systems Lab Professor G. Fainekos Presenter: Ramtin.
David Garlan Ivan Ruchkin Carnegie Mellon University Pittsburgh, PA, USA December 2014.
Formal Methods 1. Software Engineering and Formal Methods  Every software engineering methodology is based on a recommended development process  proceeding.
An Information Theory based Modeling of DSMLs Zekai Demirezen 1, Barrett Bryant 1, Murat M. Tanik 2 1 Department of Computer and Information Sciences,
COMPLEXITY SCIENCE WORKSHOP 18, 19 June 2015 Systems & Control Research Centre School of Mathematics, Computer Science and Engineering CITY UNIVERSITY.
Ch.2 Part A: Requirements, State Charts EECE **** Embedded System Design.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
© Siemens AG, CT SE 1, Dr. A. Ulrich C O R P O R A T E T E C H N O L O G Y Research at Siemens CT SE Software & Engineering Development Techniques.
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Texas A&M University Page 1 9/16/ :22:47 PM Wei Zhao Texas A&M University Is Computer Stuff Science, Engineering, or Something else?
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 22 – 10 – 2011 College Of Computer Science and Information, Information Systems.
Chapter 8 – Software Testing Lecture 1 1Chapter 8 Software testing The bearing of a child takes nine months, no matter how many women are assigned. Many.
Information Flow Properties for Security in Cyber- Physical Systems Bruce McMillin, Ph.D., Sr. Member IEEE Dir Center for Information Assurance Department.
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
Tufts Wireless Laboratory School Of Engineering Tufts University “Verifying Noninterference in a Cyber-Physical System – The Advanced Electric Power Grid”
Software Engineering Research paper presentation Ali Ahmad Formal Approaches to Software Testing Hierarchal GUI Test Case Generation Using Automated Planning.
Framework for the Development and Testing of Dependable and Safety-Critical Systems IKTA 065/ Supported by the Information and Communication.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Lecture 7: Requirements Engineering
Introduction to WOLFASI: Workshop on Logical Foundations of an Adaptive Security Infrastructure Leo Marcus The Aerospace Corporation Los Angeles July 13,
Dr. Fei Hu { Department of Electrical and Computer Engineering University of Alabama Tuscaloosa, Alabama Introduction to.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Requirements Specification. Welcome to Software Engineering: “Requirements Specification” “Requirements Specification”  Verb?  Noun?  “Specification”
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Formal Methods.
Architecture Analysis Techniques
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
Analysis of Non-Deducibility in Water Distribution System Using Security Process Algebra Jingming WANG 1 ' 2, Huiqun YU% Guilin CHEN 2, Chunxia Leng i.
1 Copyright  2001 Pao-Ann Hsiung SW HW Module Outline l Introduction l Unified HW/SW Representations l HW/SW Partitioning Techniques l Integrated HW/SW.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Course: COMS-E6125 Professor: Gail E. Kaiser Student: Shanghao Li (sl2967)
Analysis of Noninterference in Water Distribution System Using Petri Net Huiqun YU I, Chunxia Leng i, Jingming WANG 1 ' 2, Guilin CHEN 2 1 Department of.
Requirement Analysis SOFTWARE ENGINEERING. What are Requirements? Expression of desired behavior Deals with objects or entities, the states they can be.
Engineering the Advanced Power Grid: Research Challenges and Tasks M. L. Crow, F. Liu, B. McMillin, D. Tauritz {crow, fliu, ff, University.
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
1 Refactoring Design Models for Inductive Verification Yung-Pin Cheng Dept. of Info. & Comp. Edu. National Taiwan Normal Univ. TAIWAN Michal Young Dept.
CSCI 383 Object-Oriented Programming & Design Lecture 7 Martin van Bommel.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Copyright 1999 G.v. Bochmann ELG 7186C ch.1 1 Course Notes ELG 7186C Formal Methods for the Development of Real-Time System Applications Gregor v. Bochmann.
 The contribution of this work has been the application of formal methods for secure operations of cyber- physical systems  External observer in above.
Gabor Madl Ph.D. Candidate, UC Irvine Advisor: Nikil Dutt
Information Security CS 526
Information Security CS 526
Department of Computer Science Abdul Wali Khan University Mardan
Information Security CS 526
Chapter 7 Software Testing.
Activities of Formal Methods
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of Science & Technology Rolla, MO, USA CPS Week 2011: Workshop on Foundations of Dependable and Secure Cyber-Physical Systems April 11, 2011 Chicago, Illinois This work was supported in part by the Future Renewable Electric Energy Delivery and Management Systems Center (FREEDM); a National Science Foundation supported Engineering Research Center, under grant NSF EEC and in part by the Missouri S&T Intelligent Systems Center.

Cyber-Physical Systems (CPS) o Integrations of computational and physical processes o An example CPS is the FREEDM system: a smart grid managed with Distributed Grid Intelligence (DGI) o DGI consists of cyber processes that perform distributed computation to efficiently manage distributed energy resources by interfacing with Intelligent Energy Management (IEM) o There is an inter-dependence of events within the physical and cyber processes

Cyber events within a CPS involve: 1)distributed computation, 2)communication with other cyber components, and 3)communication with the physical component that it controls. Physical events include: 1)a local state change of the physical subsystem resulting from a cyber component controlling it, 2)a local physical state change resulting from the dynamics of the physical system, and 3)the observability of the physical system modeled as events CPS Interactions

CPS Smart grid Interactions e e a a c c b b d d e e a a c c b b d d e e At this IEM, information obtained from the observable physical event yields information about the cyber command (b) SST PHEV Load PV DGI SST PHEV Load Wind DGI SST Battery Load PV DGI a a b b c c d d Read state of Physical system a a Issue command to make a setting b b Message exchange including partial state information c c Power draw or contribution on the shared power bus d d e e Event due to physical flow on the shared power bus e e IEM 1 IEM 2 IEM 3

Information flow usecase of a CPS

Information Flow Security aims at guaranteeing that no high level (confidential) information is revealed to users at a low level, even in the presence of any possible cyber/physical process Potential information flow models for CPSs: – Non-Interference: Information does not flow from high to low if the high behavior has no effect on what low level observer can observe – Non-Inference: leaves a low level observer in doubt about high level events. – Non-deducibility: Given a set of low-level outputs, no low-level subject should be able to deduce anything about the high-level inputs [Sutherland]. – Composition of deducibly secure systems: not composable [McCullough] – McCullough`s Generalized noninterference-secure property considers non- determinism of real systems

A unified approach to deal with CPSs is necessary that can encompass the cyber and physical events We propose a process algebraic approach adopted to analyze the information flow in CPSs Security process algebra provides an abstract description for nondeterministic and concurrent systems with actions belonging to different levels of confidentiality (Low and High) Using process algebra, bisimulation provides a formal method to determine nondeducibility.

A system E is BNDC if for every high level process ∏, a low level user cannot distinguish E from E| ∏ E| ∏ : Parallel Composition of E1& ∏ where executions of the two systems are interleaved Bisimulation-based NonDeducibility on Composition (BNDC)

Bisimulation o Two processes are weakly bisimilar if they are able to mutually simulate their behavior step by step. o In a weak bisimilarity relation, internal silent actions ( τ ) between processes is ignored. E1 and E2 are bisimilar and they both simulate E3 E3 is not bisimilar to E1

Strong BNDC (SBNDC) The system before and after execution of a high level event remains indistinguishable to the low level domain E E E’’\H E’ E’\H E’’ h

Simplification of SBNDC: Bisimulation up to H The problem of verifying weak bisimulation for all high level transitions of the system can be transformed into finding a bisimulation up to H relation E E E\H

Recap: Process algebra and Bisimulation based security applied to a CPS The analysis involves the following steps: – Representation of cyber and physical processes and their interactions as events in the computational framework – Modeling the CPS using process algebra as a set of logic actions – Identification of the High Level and Low level events within the system – Finally, verification of bisimulation equivalence between the system that performed high level actions and the system that is restricted of performing high-level actions

SST Battery Load PV DGI SST Battery Load PV DGI SST Battery Load PV DGI Invariance of Flow in a CPS Power shared between 1 and 2 due to DGI algorithm Power flow satisfies the Kirchhoff's law of invariance on the bus that can be represented as a physical event

SST Battery Load PV DGI SST Battery Load PV DGI SST Battery Load PV DGI Smart grid in terms of SPA

SBNDC for FREEDM The system before and after execution of a high level event remains indistinguishable to the low level domain E E E’’\ H E’ E’\H E’’ h

SBNDC for FREEDM o Such processes can be modified to satisfy SBNDC by inserting a complementary High level output, to make an internal action (τ) that is not observable o Such compensating events hide the physically observable effects

Our Current Work Prototype DGI for FREEDM – IEEE SmartGridComm 2010 Akella/Ditch/McMillin/Meng/Crow Full Specification of DGI in SPA – EWICS SAFECOMP 2010 Akella/McMillin Formal Verification of Transmission Grid/Pipeline Network Security with SPA/CoPS – J. of Critical Infrastructure Protection – Akella/Tang/McMillin 2010 Component Construction for Constructing Secure Smart Grid Systems – IEEE COMPSAC 2011 Gamage/Roth/McMillin

Directions for future work Information flow analysis, with its origins in computational systems, can be extended to the realm of cyber-physical systems to verify their security Representation of physical events including attributes such as invariance and physical observability expose potential confidentiality violations Process algebra presents a uniform model of defining cyber and physical processes that can be mechanically verified Model checking complexity incurred in automating the verification of CPS processes can be reduced using techniques like partial order reduction and new bisimulation techniques to reduce state space