{"id":"https://openalex.org/W2761849397","doi":"https://doi.org/10.1109/ccta.2017.8062609","title":"Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives","display_name":"Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2761849397","doi":"https://doi.org/10.1109/ccta.2017.8062609","mag":"2761849397"},"language":"en","primary_location":{"id":"doi:10.1109/ccta.2017.8062609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccta.2017.8062609","pdf_url":null,"source":{"id":"https://openalex.org/S4306498159","display_name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067655389","display_name":"Takumi Shinohara","orcid":"https://orcid.org/0000-0002-2579-4914"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takumi Shinohara","raw_affiliation_strings":["Department of System Design Engineering, Keio University, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Department of System Design Engineering, Keio University, Kanagawa, Japan","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024386556","display_name":"Toru Namerikawa","orcid":"https://orcid.org/0000-0001-9907-4234"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toru Namerikawa","raw_affiliation_strings":["Department of System Design Engineering, Keio University, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Department of System Design Engineering, Keio University, Kanagawa, Japan","institution_ids":["https://openalex.org/I203951103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067655389"],"corresponding_institution_ids":["https://openalex.org/I203951103"],"apc_list":null,"apc_paid":null,"fwci":2.7053,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.9,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"1123","last_page":"1128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/controllability","display_name":"Controllability","score":0.6259567141532898},{"id":"https://openalex.org/keywords/kalman-filter","display_name":"Kalman filter","score":0.6038889288902283},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.574813187122345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5642513632774353},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.5517395734786987},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5475332736968994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5104100108146667},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.4958363473415375},{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.49580273032188416},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.43895992636680603},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3682865500450134},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25721919536590576},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22960183024406433},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18664833903312683},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.17820173501968384},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.17814961075782776}],"concepts":[{"id":"https://openalex.org/C48209547","wikidata":"https://www.wikidata.org/wiki/Q1331104","display_name":"Controllability","level":2,"score":0.6259567141532898},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.6038889288902283},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.574813187122345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5642513632774353},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.5517395734786987},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5475332736968994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5104100108146667},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.4958363473415375},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.49580273032188416},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.43895992636680603},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3682865500450134},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25721919536590576},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22960183024406433},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18664833903312683},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.17820173501968384},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.17814961075782776},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccta.2017.8062609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccta.2017.8062609","pdf_url":null,"source":{"id":"https://openalex.org/S4306498159","display_name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1972523481","https://openalex.org/W1975720701","https://openalex.org/W2003530067","https://openalex.org/W2005028112","https://openalex.org/W2016617706","https://openalex.org/W2028239856","https://openalex.org/W2049928315","https://openalex.org/W2052631265","https://openalex.org/W2105773843","https://openalex.org/W2107043025","https://openalex.org/W2135123910","https://openalex.org/W2149811200","https://openalex.org/W2150436340","https://openalex.org/W2158914121","https://openalex.org/W2322427245","https://openalex.org/W2343541124","https://openalex.org/W2734555013","https://openalex.org/W6675810980","https://openalex.org/W6683576895"],"related_works":["https://openalex.org/W2036697162","https://openalex.org/W2411113819","https://openalex.org/W2072887367","https://openalex.org/W2332386680","https://openalex.org/W2561315646","https://openalex.org/W2248621902","https://openalex.org/W2003779889","https://openalex.org/W4205698120","https://openalex.org/W4239246781","https://openalex.org/W2060424468"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,102],"analyze":[4],"the":[5,55,59,64,68,81,94,104,112,115,121,124],"vulnerabilities":[6],"due":[7],"to":[8,74],"novel":[9],"integrity":[10],"cyber":[11],"attacks":[12,46,96,106,125],"in":[13],"CPS,":[14],"which":[15,77],"are":[16,47],"modeled":[17],"as":[18],"a":[19,27,34,50,90,108,129],"stochastic":[20],"Linear":[21],"Time-Invariant":[22],"(LTI)":[23],"system":[24,61,70],"equipped":[25],"with":[26,63,107],"Kalman":[28],"filter,":[29],"an":[30,42,75,86],"LQG":[31],"controller,":[32],"and":[33,89,111],"\u03c7":[35],"<sup":[36],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[37],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[38],"failure":[39],"detector":[40],"from":[41],"attacker's":[43],"standpoint.":[44],"The":[45],"designed":[48,79],"by":[49,80],"sophisticated":[51],"attacker":[52],"so":[53],"that":[54],"measurement":[56],"residual":[57],"of":[58,93,114,123],"compromised":[60],"coincides":[62],"healthy":[65],"one.":[66],"Additionally,":[67],"attacked":[69],"state":[71],"is":[72,78,118,126],"manipulated":[73],"objective":[76],"adversary.":[82],"We":[83],"first":[84],"show":[85],"existence":[87],"condition":[88,113],"design":[91],"procedure":[92],"stealthy":[95,105],"using":[97],"invariant":[98],"subspace":[99],"property.":[100],"Then,":[101],"formulate":[103],"malicious":[109],"objective,":[110],"feasible":[116],"objectives":[117],"derived.":[119],"Finally,":[120],"dangerousness":[122],"verified":[127],"through":[128],"numerical":[130],"simulation.":[131]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
