{"id":"https://openalex.org/W7117307782","doi":"https://doi.org/10.48550/arxiv.2512.20873","title":"Systemization of Knowledge: Resilience and Fault Tolerance in Cyber-Physical Systems","display_name":"Systemization of Knowledge: Resilience and Fault Tolerance in Cyber-Physical Systems","publication_year":2025,"publication_date":"2025-12-24","ids":{"openalex":"https://openalex.org/W7117307782","doi":"https://doi.org/10.48550/arxiv.2512.20873"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.20873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.20873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.20873","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121328773","display_name":"Rahul Bulusu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bulusu, Rahul","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5121328773"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.2054000049829483,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.2054000049829483,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.16429999470710754,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0835999995470047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6470000147819519},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5353999733924866},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.49230000376701355},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.34619998931884766},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.3285999894142151},{"id":"https://openalex.org/keywords/complex-system","display_name":"Complex system","score":0.32269999384880066},{"id":"https://openalex.org/keywords/physical-system","display_name":"Physical system","score":0.3109000027179718},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3041999936103821}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6626999974250793},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6470000147819519},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5353999733924866},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.49230000376701355},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47440001368522644},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.3285999894142151},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C116672817","wikidata":"https://www.wikidata.org/wiki/Q1454986","display_name":"Physical system","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3041999936103821},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3034999966621399},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C164100034","wikidata":"https://www.wikidata.org/wiki/Q1870629","display_name":"Loose coupling","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28119999170303345},{"id":"https://openalex.org/C194541083","wikidata":"https://www.wikidata.org/wiki/Q457174","display_name":"Workaround","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.27230000495910645},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.27059999108314514},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.20873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.20873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.20873","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.20873","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.6088032126426697,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Cyber-Physical":[0],"Systems":[1],"(CPS)":[2],"now":[3],"support":[4],"critical":[5],"infrastructure":[6],"spanning":[7],"transportation,":[8],"energy,":[9],"manufacturing,":[10],"medical":[11],"devices,":[12],"and":[13,26,54,98,120,135,167,169,176,195],"autonomous":[14],"robotics.":[15],"Their":[16],"defining":[17],"characteristic":[18],"is":[19],"the":[20,125],"tight":[21],"coupling":[22],"between":[23,164],"digital":[24],"computation":[25],"continuous":[27],"physical":[28,48,177],"dynamics":[29],"which":[30],"enables":[31],"sophisticated":[32],"autonomy":[33],"but":[34],"also":[35],"creates":[36],"highly":[37],"non-linear":[38],"failure":[39],"modes.":[40],"Small":[41],"disturbances":[42],"at":[43],"sensors,":[44],"firmware,":[45,168],"networks,":[46],"or":[47],"interfaces":[49],"can":[50],"propagate":[51],"through":[52],"estimation":[53],"control":[55,157],"pipelines,":[56],"producing":[57],"cascading":[58],"instabilities":[59],"that":[60,147],"defy":[61],"traditional":[62],"single-layer":[63],"reasoning.":[64],"This":[65,84],"Systematization":[66],"of":[67,74,130,138],"Knowledge":[68],"(SoK)":[69],"unifies":[70],"nearly":[71],"two":[72],"decades":[73],"CPS":[75,101,150,186],"resilience":[76],"research":[77],"into":[78],"a":[79,87],"structured":[80],"Origin-Layer-Effect":[81],"(OLE)":[82],"taxonomy.":[83],"taxonomy":[85],"provides":[86],"cross-layer":[88],"lens":[89],"for":[90,184],"understanding":[91],"how":[92,95],"faults":[93],"arise,":[94],"they":[96],"propagate,":[97],"why":[99],"unrelated":[100],"failures":[102],"often":[103],"share":[104],"deep":[105],"structural":[106,145],"similarities.":[107],"By":[108],"mapping":[109],"representative":[110],"systems":[111],"including":[112],"RockDrone,":[113],"MAYDAY,":[114],"M2MON,":[115],"HACMS,":[116],"Byzantine":[117],"fault-tolerant":[118],"control,":[119,190],"learning-based":[121],"recovery":[122],"mechanisms":[123],"onto":[124],"taxonomy,":[126],"we":[127],"reveal":[128],"patterns":[129],"coverage,":[131],"persistent":[132],"blind":[133],"spots,":[134],"recurring":[136],"pathways":[137],"fault":[139],"amplification.":[140],"Our":[141],"analysis":[142],"identifies":[143],"four":[144],"gaps":[146],"span":[148],"multiple":[149],"domains:":[151],"(1)":[152],"physical-model":[153],"manipulation,":[154],"(2)":[155],"ML-enabled":[156],"without":[158],"stability":[159],"guarantees,":[160],"(3)":[161],"semantic":[162],"inconsistencies":[163],"formal":[165,193],"models":[166],"(4)":[170],"inadequate":[171],"forensic":[172],"visibility":[173],"across":[174],"cyber":[175],"layers.":[178],"These":[179],"insights":[180],"motivate":[181],"new":[182],"directions":[183],"resilient":[185],"design,":[187],"integrating":[188],"robust":[189],"runtime":[191],"monitoring,":[192],"assurance,":[194],"system-level":[196],"visibility.":[197]},"counts_by_year":[],"updated_date":"2025-12-26T23:12:39.385286","created_date":"2025-12-26T00:00:00"}
