secure state-estimation and control for cyber-physical ... · paulo tabuada,yasser shoukry, and...

73
Lab Secure state-estimation and control for cyber-physical systems under adversarial attacks Paulo Tabuada, Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical Engineering University of California at Los Angeles Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 1 / 22

Upload: others

Post on 26-Sep-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Secure state-estimation and controlfor cyber-physical systems under adversarial attacks

Paulo Tabuada, Yasser Shoukry,and several other collaborators

Cyber-Physical Systems LaboratoryDepartment of Electrical Engineering

University of California at Los Angeles

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 1 / 22

Page 2: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

The setup

Physical process modeled as a linear dynamical system:

x(t + 1) = Ax(t) + Bu(t), x(t) ∈ Rn, u(t) ∈ Rm, t ∈ N0.

A total of p sensors monitor state of plant (y(t) ∈ Rp):

y(t) = Cx(t)

+ e(t).︸︷︷︸attackvector

Some sensors are attacked:

ei (t) 6= 0 −→ sensor i is attacked at time t ;

If sensor i is attacked, ei (t) can be arbitrary (no boundedness assumption,no stochastic model, etc.);

Set of attacked sensors (unknown) has cardinality q.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 2 / 22

Page 3: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

The setup

Physical process modeled as a linear dynamical system:

x(t + 1) = Ax(t) + Bu(t), x(t) ∈ Rn, u(t) ∈ Rm, t ∈ N0.

A total of p sensors monitor state of plant (y(t) ∈ Rp):

y(t) = Cx(t)

+ e(t).︸︷︷︸attackvector

Some sensors are attacked:

ei (t) 6= 0 −→ sensor i is attacked at time t ;

If sensor i is attacked, ei (t) can be arbitrary (no boundedness assumption,no stochastic model, etc.);

Set of attacked sensors (unknown) has cardinality q.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 2 / 22

Page 4: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

The setup

Physical process modeled as a linear dynamical system:

x(t + 1) = Ax(t) + Bu(t), x(t) ∈ Rn, u(t) ∈ Rm, t ∈ N0.

A total of p sensors monitor state of plant (y(t) ∈ Rp):

y(t) = Cx(t) + e(t).︸︷︷︸attackvector

Some sensors are attacked:

ei (t) 6= 0 −→ sensor i is attacked at time t ;

If sensor i is attacked, ei (t) can be arbitrary (no boundedness assumption,no stochastic model, etc.);

Set of attacked sensors (unknown) has cardinality q.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 2 / 22

Page 5: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

The setup

Physical process modeled as a linear dynamical system:

x(t + 1) = Ax(t) + Bu(t), x(t) ∈ Rn, u(t) ∈ Rm, t ∈ N0.

A total of p sensors monitor state of plant (y(t) ∈ Rp):

y(t) = Cx(t) + e(t).︸︷︷︸attackvector

Some sensors are attacked:

ei (t) 6= 0 −→ sensor i is attacked at time t ;If sensor i is attacked, ei (t) can be arbitrary (no boundedness assumption,no stochastic model, etc.);

Set of attacked sensors (unknown) has cardinality q.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 2 / 22

Page 6: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

The setup

Physical process modeled as a linear dynamical system:

x(t + 1) = Ax(t) + Bu(t), x(t) ∈ Rn, u(t) ∈ Rm, t ∈ N0.

A total of p sensors monitor state of plant (y(t) ∈ Rp):

y(t) = Cx(t) + e(t).︸︷︷︸attackvector

Some sensors are attacked:

ei (t) 6= 0 −→ sensor i is attacked at time t ;If sensor i is attacked, ei (t) can be arbitrary (no boundedness assumption,no stochastic model, etc.);

Set of attacked sensors (unknown) has cardinality q.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 2 / 22

Page 7: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 8: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 9: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 10: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 11: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 12: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 13: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Questioning the setup

Are physical systems really linear?

No! Our first results used ideas from compressed sensing and errorcorrection over the reals, hence linearity.The current understanding allows for nonlinear systems, conceptually.

Why is the set of attacked sensors fixed throughout the game?

Compromising a sensor takes time.While the attacker is working to compromise one additional sensor we cantreat the set of attacked sensors as fixed.

Is the attacker attacking the sensors or the communication between the sensorsand the controller?

Our results are independent of where and how the attack is conducted.

Can you not protect the sensors or the communication using cyber-securitytechniques?

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 3 / 22

Page 14: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Attacking sensors

Noninvasive spoofing attacks for Anti-Lock Braking systemsY. Shoukry, P. Martin, P. Tabuada, and M. Srivastava.Workshop on Cryptographic Hardware and Embedded Systems, 2013 (CHES 2013).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 4 / 22

Page 15: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Attacking sensors

Noninvasive spoofing attacks for Anti-Lock Braking systemsY. Shoukry, P. Martin, P. Tabuada, and M. Srivastava.Workshop on Cryptographic Hardware and Embedded Systems, 2013 (CHES 2013).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 4 / 22

Page 16: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Attacking sensors

Noninvasive spoofing attacks for Anti-Lock Braking systemsY. Shoukry, P. Martin, P. Tabuada, and M. Srivastava.Workshop on Cryptographic Hardware and Embedded Systems, 2013 (CHES 2013).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 4 / 22

Page 17: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Attacking sensors

Noninvasive spoofing attacks for Anti-Lock Braking systemsY. Shoukry, P. Martin, P. Tabuada, and M. Srivastava.Workshop on Cryptographic Hardware and Embedded Systems, 2013 (CHES 2013).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 4 / 22

Page 18: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

A separation result

The attacks are arbitrary, in particular they can be nonlinear and time-varying.

Do we need to design a nonlinear and time-varying controller to be resilient toattacks?

Theorem

Consider the linear control system:

x(t + 1) = Ax(t) + Bu(t)

y(t) = Cx(t) + e(t).

If there exists a controller u(t) = φ(t , y(0), . . . , y(t)) rendering the closed-loop systemexponentially stablea despite an adversarial attack to q sensors then there exists adecoder D : Rn×p → Rn that correctly reconstructs the state in n steps:

x(t − n + 1) = D(y(t − n + 1), . . . , y(t)).

afor a rate of decay smaller than the smallest eigenvalue of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 5 / 22

Page 19: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

A separation result

The attacks are arbitrary, in particular they can be nonlinear and time-varying.

Do we need to design a nonlinear and time-varying controller to be resilient toattacks?

Theorem

Consider the linear control system:

x(t + 1) = Ax(t) + Bu(t)

y(t) = Cx(t) + e(t).

If there exists a controller u(t) = φ(t , y(0), . . . , y(t)) rendering the closed-loop systemexponentially stablea despite an adversarial attack to q sensors then there exists adecoder D : Rn×p → Rn that correctly reconstructs the state in n steps:

x(t − n + 1) = D(y(t − n + 1), . . . , y(t)).

afor a rate of decay smaller than the smallest eigenvalue of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 5 / 22

Page 20: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

A separation result

Theorem

Consider the linear control system:

x(t + 1) = Ax(t) + Bu(t)

y(t) = Cx(t) + e(t).

If there exists a controller u(t) = φ(t , y(0), . . . , y(t)) rendering the closed-loop systemexponentially stablea despite an adversarial attack to q sensors then there exists adecoder D : Rn×p → Rn that correctly reconstructs the state in n steps:

x(t − n + 1) = D(y(t − n + 1), . . . , y(t)).

afor a rate of decay smaller than the smallest eigenvalue of A.

We can design a controller resilient to attacks in two steps:

1 design the decoder (observer) D;

2 design a linear static controller.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 6 / 22

Page 21: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t) + Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 22: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t) + Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 23: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t)

+ Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 24: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t)

+ Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 25: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t)

+ Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 26: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t)

+ Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 27: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Error correction

x(t + 1) = Ax(t)

+ Bu(t)

y(t) = Cx(t) + e(t)

We assume the input to be known since we design the controller. For simplicitywe will take u(t) = 0 for all t ∈ N0;

A decoder (observer) D processes observations y(0), . . . , y(T − 1) andproduces an estimate of the initial state x(0).

We say that a decoder D : (Rp)T → Rn corrects q errors after T steps if it isresilient against any attack of q sensors, i.e., if for any initial condition x(0) ∈ Rn,and for any attack vectors e(0), . . . , e(T − 1) on q sensors we have:

D(y(0), . . . , y(T − 1)) = x(0).

We say that q errors are correctable, for the system (A,C), if there exists adecoder that can correct q errors.

Note: correcting q = 0 errors is equivalent to observability.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 7 / 22

Page 28: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 29: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 30: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.

This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 31: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.

Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 32: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.

Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 33: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 34: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Correction of q errorsNecessary and sufficient conditions

A pair (A,C) is said to be q-sparse observable if all the pairs (A,C′), obtainedfrom (A,C) by removing q rows from C, remain observable.

TheoremFor any pair (A,C), q errors are correctable iff (A,C) is 2q-sparse observable.

No more than p/2 errors can be corrected since 2q is necessarily smaller than p.This is a fundamental limitation: if an attacker has access to more than half ofthe sensors (> p/2), it is impossible to reconstruct the state.Information theoretic interpretation: if a pair (A,C) is θ-sparse observable, theHamming distance between two sequences of outputs is at least θ + 1.Can we efficiently check sparse observability?

PropositionLet A be a diagonalizable matrix with eigenvalues of different magnitudes. Then, forany C of compatible dimensions, q errors are correctable for the pair (A,C) iff|supp(Cv)| > 2q for every eigenvector v of A.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 8 / 22

Page 35: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksConvex relaxation approach

First approach: decoding as an `0-optimization problem. Use `0 → `1 relaxation.

Example:IEEE 14-bus power network (5 generators, 14 buses);n = 2× 5 = 10 states for the rotor angles δi and the frequencies dδi/dt ofeach generator i ;p = 35 sensors to measure: real power injections at every bus (14sensors), real power flows along every branch (20 sensors), rotor angle atgenerator 1 (1 sensor) 1.

5 10 15 20 25 300

0.2

0.4

0.6

0.8

1

number of attacked sensors (q)

frac

tion

fraction of initial conditionsrecovered in less than 10 steps

1cf. [Pasqualetti, Dorfler, Bullo 2010]. Thanks to Fabio Pasqualetti from UCR for the data!

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 9 / 22

Page 36: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksConvex relaxation approach

First approach: decoding as an `0-optimization problem. Use `0 → `1 relaxation.

Example:IEEE 14-bus power network (5 generators, 14 buses);n = 2× 5 = 10 states for the rotor angles δi and the frequencies dδi/dt ofeach generator i ;p = 35 sensors to measure: real power injections at every bus (14sensors), real power flows along every branch (20 sensors), rotor angle atgenerator 1 (1 sensor) 1.

5 10 15 20 25 300

0.2

0.4

0.6

0.8

1

number of attacked sensors (q)

frac

tion

fraction of initial conditionsrecovered in less than 10 steps

1cf. [Pasqualetti, Dorfler, Bullo 2010]. Thanks to Fabio Pasqualetti from UCR for the data!

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 9 / 22

Page 37: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksConvex relaxation approach

First approach: decoding as an `0-optimization problem. Use `0 → `1 relaxation.

Example:IEEE 14-bus power network (5 generators, 14 buses);n = 2× 5 = 10 states for the rotor angles δi and the frequencies dδi/dt ofeach generator i ;p = 35 sensors to measure: real power injections at every bus (14sensors), real power flows along every branch (20 sensors), rotor angle atgenerator 1 (1 sensor) 1.

5 10 15 20 25 300

0.2

0.4

0.6

0.8

1

number of attacked sensors (q)

frac

tion

fraction of initial conditionsrecovered in less than 10 steps

1cf. [Pasqualetti, Dorfler, Bullo 2010]. Thanks to Fabio Pasqualetti from UCR for the data!

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 9 / 22

Page 38: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oix‖2

2 ≤ 0

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 39: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oix‖2

2 ≤ 0

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 40: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oix‖2

2 ≤ 0

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 41: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oix‖2

2 ≤ 0

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 42: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ Yi = Oix

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 43: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

Collect τ measurements:

Yi =

{Oix + Ei if sensor i is under attack,Oix if sensor i is attack-free

For each individual sensor, we define a binary indicator variable bi ∈ B bydeclaring bi = 1 when the i th sensor is under attack and bi = 0 otherwise.

Problem (secure state-estimation)For the linear control system under attack Σa, construct η = (x , b) ∈ Rn × Bp such thatη |= φ, i.e., η satisfies the formula φ defined by:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oix‖2

2 ≤ 0

) ∧ ( p∑i=1

bi ≤ q

).

Collect τ measurements:

yi (t − τ + 1)

yi (t − τ)...

yi (t)

︸ ︷︷ ︸

Yi

=

Ci

CiA...

CiAτ−1

︸ ︷︷ ︸

Oi

x +

ai (t − τ + 1)

ai (t − τ)...

ai (t)

︸ ︷︷ ︸

Ei

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 10 / 22

Page 44: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture I

SMT = pB-SAT solver + T -Solver.

pB-SAT solver: solves the “booleanversion” of the problem.

Original formula:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oi x‖

22 ≤ 0

)

∧( p∑i∈1

bi ≤ q

).

Replace non-booleanvariables with boolean ones

φinitial ::=

p∧i=1

(¬bi ⇒ ci

)∧( p∑i=1

bi ≤ q

)

Pass φinitial to the SAT solver.

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1, ‖Ψ1‖2

2

). . .(

Yp,Op, ‖Ψp‖22

)}

η = (x , b)b, I

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 11 / 22

Page 45: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture I

SMT = pB-SAT solver + T -Solver.

pB-SAT solver: solves the “booleanversion” of the problem.

Original formula:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oi x‖

22 ≤ 0

)

∧( p∑i∈1

bi ≤ q

).

Replace non-booleanvariables with boolean ones

φinitial ::=

p∧i=1

(¬bi ⇒ ci

)∧( p∑i=1

bi ≤ q

)

Pass φinitial to the SAT solver.

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1, ‖Ψ1‖2

2

). . .(

Yp,Op, ‖Ψp‖22

)}

η = (x , b)b, I

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 11 / 22

Page 46: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture I

SMT = pB-SAT solver + T -Solver.

pB-SAT solver: solves the “booleanversion” of the problem.

Original formula:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oi x‖

22 ≤ 0

)

∧( p∑i∈1

bi ≤ q

).

Replace non-booleanvariables with boolean ones

φinitial ::=

p∧i=1

(¬bi ⇒ ci

)∧( p∑i=1

bi ≤ q

)

Pass φinitial to the SAT solver.

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1, ‖Ψ1‖2

2

). . .(

Yp,Op, ‖Ψp‖22

)}

η = (x , b)b, I

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 11 / 22

Page 47: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture I

SMT = pB-SAT solver + T -Solver.

pB-SAT solver: solves the “booleanversion” of the problem.

Original formula:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oi x‖

22 ≤ 0

)

∧( p∑i∈1

bi ≤ q

).

Replace non-booleanvariables with boolean ones

φinitial ::=

p∧i=1

(¬bi ⇒ ci

)∧( p∑i=1

bi ≤ q

)

Pass φinitial to the SAT solver.

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1, ‖Ψ1‖2

2

). . .(

Yp,Op, ‖Ψp‖22

)}

η = (x , b)b, I

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 11 / 22

Page 48: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture I

SMT = pB-SAT solver + T -Solver.

pB-SAT solver: solves the “booleanversion” of the problem.

Original formula:

φ ::=

p∧i=1

(¬bi ⇒ ‖Yi −Oi x‖

22 ≤ 0

)

∧( p∑i∈1

bi ≤ q

).

Replace non-booleanvariables with boolean ones

φinitial ::=

p∧i=1

(¬bi ⇒ ci

)∧( p∑i=1

bi ≤ q

)

Pass φinitial to the SAT solver.

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1, ‖Ψ1‖2

2

). . .(

Yp,Op, ‖Ψp‖22

)}

η = (x , b)b, I

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 11 / 22

Page 49: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture II

pB-SAT solver returns anassignment for the variable b.

We extract which sensors are“hypothesized” to be attack free I.

Check this assignment.

1: Solve:x := argminx∈Rn ‖YI −OIx‖2

2

2: if ‖YI −OIx‖22 = 0 then

3: status = SAT; ©

4: else5: status = UNSAT; §

6: end if7: return (status, x);

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial

{(Y1,O1) . . . (Yp,Op)}

b, I

η = (x , b)

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 12 / 22

Page 50: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture II

pB-SAT solver returns anassignment for the variable b.

We extract which sensors are“hypothesized” to be attack free I.

Check this assignment.

1: Solve:x := argminx∈Rn ‖YI −OIx‖2

2

2: if ‖YI −OIx‖22 = 0 then

3: status = SAT; ©

4: else5: status = UNSAT; §

6: end if7: return (status, x);

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I

η = (x , b)

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 12 / 22

Page 51: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture II

pB-SAT solver returns anassignment for the variable b.

We extract which sensors are“hypothesized” to be attack free I.

Check this assignment.

1: Solve:x := argminx∈Rn ‖YI −OIx‖2

2

2: if ‖YI −OIx‖22 = 0 then

3: status = SAT; ©

4: else5: status = UNSAT; §

6: end if7: return (status, x);

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I

η = (x , b)

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 12 / 22

Page 52: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture II

pB-SAT solver returns anassignment for the variable b.

We extract which sensors are“hypothesized” to be attack free I.

Check this assignment.

1: Solve:x := argminx∈Rn ‖YI −OIx‖2

2

2: if ‖YI −OIx‖22 = 0 then

3: status = SAT; ©

4: else5: status = UNSAT; §

6: end if7: return (status, x);

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 12 / 22

Page 53: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture II

pB-SAT solver returns anassignment for the variable b.

We extract which sensors are“hypothesized” to be attack free I.

Check this assignment.

1: Solve:x := argminx∈Rn ‖YI −OIx‖2

2

2: if ‖YI −OIx‖22 = 0 then

3: status = SAT; ©4: else5: status = UNSAT; §6: end if7: return (status, x);

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 12 / 22

Page 54: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture III

Generate “theory lemma”, “counterexample”, or “UNSAT certificate”.

φtriv-cert =∑i∈I

bi ≥ 1

Add this “certificate” to the originalconstraints:

φ := φinitial ∧ φtriv-cert

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

REPEAT

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 13 / 22

Page 55: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture III

Generate “theory lemma”, “counterexample”, or “UNSAT certificate”.

φtriv-cert =∑i∈I

bi ≥ 1

Add this “certificate” to the originalconstraints:

φ := φinitial ∧ φtriv-cert

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

REPEAT

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 13 / 22

Page 56: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture III

Generate “theory lemma”, “counterexample”, or “UNSAT certificate”.

φtriv-cert =∑i∈I

bi ≥ 1

Add this “certificate” to the originalconstraints:

φ := φinitial ∧ φtriv-cert

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

REPEAT

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 13 / 22

Page 57: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Lazy SMT Architecture III

Generate “theory lemma”, “counterexample”, or “UNSAT certificate”.

φtriv-cert =∑i∈I

bi ≥ 1

Add this “certificate” to the originalconstraints:

φ := φinitial ∧ φtriv-cert

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) . . . (Yp,Op)}

b, I η = (x , b)

I

φcert

REPEAT

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 13 / 22

Page 58: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Termination and performance

System Dynamics:

Σa

{x(t + 1) = Ax(t)y(t) = Cx(t) + a(t)

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) , . . . , (Yp,Op)}

η = (x, b)b, I = supp(b)

I

φcert

PropositionLet the linear dynamical system Σa be 2q-sparse observable. Then, IMHOTEP-SMT:

terminates,

identifies the attacked sensors,

and reconstructs the state.

Moreover, the number of iterations is upper bounded by∑q

s=0

(ps

).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 14 / 22

Page 59: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: UNSAT certificates

Why is performance bad?

φtriv-cert =∑i∈I

bi ≥ 1

To enhance performance, we need to generate compact certificates.

LemmaLet the linear dynamical system Σa be 2q-sparse observable. If T -SOLVE.CHECK(I)is UNSAT then there exists a subset I ⊂ supp(b) with |I| ≤ p − 2q + 1 such thatT -SOLVE.CHECK(Itemp) is also UNSAT.

Trivial certificates have p − q sensors.

The proof of this lemma is constructive.

In practice we can do better by exploiting the convex geometry (observabilityGramian).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 15 / 22

Page 60: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: UNSAT certificates

Why is performance bad?

φtriv-cert =∑i∈I

bi ≥ 1

To enhance performance, we need to generate compact certificates.

LemmaLet the linear dynamical system Σa be 2q-sparse observable. If T -SOLVE.CHECK(I)is UNSAT then there exists a subset I ⊂ supp(b) with |I| ≤ p − 2q + 1 such thatT -SOLVE.CHECK(Itemp) is also UNSAT.

Trivial certificates have p − q sensors.

The proof of this lemma is constructive.

In practice we can do better by exploiting the convex geometry (observabilityGramian).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 15 / 22

Page 61: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: UNSAT certificates

Why is performance bad?

φtriv-cert =∑i∈I

bi ≥ 1

To enhance performance, we need to generate compact certificates.

LemmaLet the linear dynamical system Σa be 2q-sparse observable. If T -SOLVE.CHECK(I)is UNSAT then there exists a subset I ⊂ supp(b) with |I| ≤ p − 2q + 1 such thatT -SOLVE.CHECK(Itemp) is also UNSAT.

Trivial certificates have p − q sensors.

The proof of this lemma is constructive.

In practice we can do better by exploiting the convex geometry (observabilityGramian).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 15 / 22

Page 62: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: UNSAT certificates

pseudoBoolean

(pB)SAT-solver

T -SOLVE.CHECK

T -SOLVE.CERTIFICATE

T -SOLVE

IMHOTEP-SMT

φinitial {(Y1,O1) , . . . , (Yp,Op)}

η = (x, b)b, I = supp(b)

I

φcert

TheoremLet the linear dynamical system Σa be 2q-sparse observable. Then, IMHOTEP-SMT:

terminates,

identifies the attacked sensors,

and reconstructs the state.

Moreover, the number of iterations is upper bounded by( p

p−2q+1

)(compare to:∑q

s=0

(ps

)).

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 16 / 22

Page 63: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Simulation results

Random system with 25 states 60sensors and an increasing numberof attacked sensors.

1 5 10 15 20

0

100

200

300

400

500

Number of attacked sensors q

Num

bero

fite

ratio

ns

φtriv-cert φconf-cert φconf-cert ∧ φagree-cert

Random systems with 25 states,1/3 of sensors under attack, andincreasing number of sensors.

3 15 30 45 60

0

100

200

300

400

500

Number of sensors p

Num

bero

fite

ratio

ns

φtriv-cert φconf-cert φconf-cert ∧ φagree-cert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 17 / 22

Page 64: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Simulation results

Random system with 25 states 60sensors and an increasing numberof attacked sensors.

1 5 10 15 20

0

100

200

300

400

500

Number of attacked sensors q

Num

bero

fite

ratio

ns

φtriv-cert φconf-cert φconf-cert ∧ φagree-cert

Random systems with 25 states,1/3 of sensors under attack, andincreasing number of sensors.

3 15 30 45 60

0

100

200

300

400

500

Number of sensors p

Num

bero

fite

ratio

ns

φtriv-cert φconf-cert φconf-cert ∧ φagree-cert

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 17 / 22

Page 65: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Simulation results

Comparison with 2 convex-relaxation algorithms and 2 logic-based encodings.

Random systems with 60 sensors(20 under attack) and an increasingnumber of states.

10 25 50 75 100 150

0

50

100

150

200

Number of states n

Exe

cutio

ntim

e(s

ec)

SMT ETPG Lr/L2 dReal Z3

Random systems with 50 states,1/3 of sensors under attack, andincreasing number of sensors.

3 30 60 90 120 150

0

10

20

30

Number of sensors p

Exe

cutio

ntim

e(s

ec)

SMT ETPG Lr/L2 dReal Z3

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 18 / 22

Page 66: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Simulation results

Comparison with 2 convex-relaxation algorithms and 2 logic-based encodings.

Random systems with 60 sensors(20 under attack) and an increasingnumber of states.

10 25 50 75 100 150

0

50

100

150

200

Number of states n

Exe

cutio

ntim

e(s

ec)

SMT ETPG Lr/L2 dReal Z3

Random systems with 50 states,1/3 of sensors under attack, andincreasing number of sensors.

3 30 60 90 120 150

0

10

20

30

Number of sensors p

Exe

cutio

ntim

e(s

ec)

SMT ETPG Lr/L2 dReal Z3

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 18 / 22

Page 67: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Examples

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 19 / 22

Page 68: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

State reconstruction under sensor attacksA Satisfiability Modulo Theory Approach: Some extensions

Stochastic noise:

combine Kalman filters with SMT solving;optimal performance: as good as a minimummean squared error (MMSE) estimator thatknows the attacked sensors1.

Nonlinear systems: differential flatness andapplications to quadcopters2.

1 Secure State Estimation Against Sensor Attacks in the Presence of NoiseShaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas Diggavi, Paulo TabuadaIEEE Transactions on Control of Network Systems, 4(1), 49-59, 2017Special issue on Secure Control of Cyber-Physical Systems

2 Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks Using Satisfiability Modulo Theory SolvingY. Shoukry, P. Nuzzo, N. Bezzo, A. L. Sangiovanni-Vincentelli, S. A. Seshia, P. TabuadaIEEE Conference on Decision and Control, 2015.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 20 / 22

Page 69: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Securing Cyber-Physical SystemsFinal thoughts

Security for CPS is quite different from cyber-security, e.g., there are CPSattacks for which there are no cyber-security defenses;

Cyber-security is needed for CPS but CPS-security is the last line of defense.

Challenging technical problems mixing continuous and discrete variables.

These techniques led1 to Satisfiability Modulo Convex optimization (SMC), anew tool capable of handling many of these continuous+discrete challengesacross a wide range of application domains (robot motion planning, etc).

1 SMC: Satisfiability Modulo Convex ProgrammingYasser Shoukry, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, George J. Pappas, Paulo TabuadaProceedings of the IEEE, 106(9), 2018.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 21 / 22

Page 70: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Securing Cyber-Physical SystemsFinal thoughts

Security for CPS is quite different from cyber-security, e.g., there are CPSattacks for which there are no cyber-security defenses;

Cyber-security is needed for CPS but CPS-security is the last line of defense.

Challenging technical problems mixing continuous and discrete variables.

These techniques led1 to Satisfiability Modulo Convex optimization (SMC), anew tool capable of handling many of these continuous+discrete challengesacross a wide range of application domains (robot motion planning, etc).

1 SMC: Satisfiability Modulo Convex ProgrammingYasser Shoukry, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, George J. Pappas, Paulo TabuadaProceedings of the IEEE, 106(9), 2018.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 21 / 22

Page 71: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Securing Cyber-Physical SystemsFinal thoughts

Security for CPS is quite different from cyber-security, e.g., there are CPSattacks for which there are no cyber-security defenses;

Cyber-security is needed for CPS but CPS-security is the last line of defense.

Challenging technical problems mixing continuous and discrete variables.

These techniques led1 to Satisfiability Modulo Convex optimization (SMC), anew tool capable of handling many of these continuous+discrete challengesacross a wide range of application domains (robot motion planning, etc).

1 SMC: Satisfiability Modulo Convex ProgrammingYasser Shoukry, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, George J. Pappas, Paulo TabuadaProceedings of the IEEE, 106(9), 2018.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 21 / 22

Page 72: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Securing Cyber-Physical SystemsFinal thoughts

Security for CPS is quite different from cyber-security, e.g., there are CPSattacks for which there are no cyber-security defenses;

Cyber-security is needed for CPS but CPS-security is the last line of defense.

Challenging technical problems mixing continuous and discrete variables.

These techniques led1 to Satisfiability Modulo Convex optimization (SMC), anew tool capable of handling many of these continuous+discrete challengesacross a wide range of application domains (robot motion planning, etc).

1 SMC: Satisfiability Modulo Convex ProgrammingYasser Shoukry, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia, George J. Pappas, Paulo TabuadaProceedings of the IEEE, 106(9), 2018.

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 21 / 22

Page 73: Secure state-estimation and control for cyber-physical ... · Paulo Tabuada,Yasser Shoukry, and several other collaborators Cyber-Physical Systems Laboratory Department of Electrical

Lab

Acknowledgements

Students and collaborators;

NSF, DARPA, and ARL;

Grid Science Organisers.

For more information:http://www.cyphylab.ee.ucla.edu/http://www.ee.ucla.edu/∼tabuada

Paulo Tabuada (CyPhyLab - UCLA) Secure CPS Grid Science 2019 22 / 22