Abstract

With increasing complexity, connectivity, and programmability of embedded CPS devices, the potential cyber-attack surface has also been increasing making the study of related cyber-security issues highly relevant and timely. This article provides an efficient verification method for runtime applications with tight performance specifications. By considering classification and the declarative and definitive properties of different types of attacks, it is shown that a runtime security monitor can be generated to assure the security of application execution against known threats given the performance requirements. The methodology is applied in a healthcare application of insulin pump to regulate blood sugar level. — Farshad Khorrami, New York University

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call