TY - GEN
T1 - Cyber-Physical Firewall
T2 - 19th ACM International Conference on Computing Frontiers, CF 2022
AU - Iijima, Ryo
AU - Takehisa, Tatsuya
AU - Mori, Tatsuya
N1 - Funding Information:
A part of this work was supported by JSPS Grant-in-Aid for Scientific Research, Grant Number 19H04111.
Publisher Copyright:
© 2022 ACM.
PY - 2022/5/17
Y1 - 2022/5/17
N2 - This work developed a new security framework named Cyber-Physical Firewall (CPFW), which provides a generic and flexible access control mechanism for regulating the malicious analog signals that target cyber-physical system (CPS) devices. This framework enables the defeat of various attacks that make use of malicious analog signals against CPS devices; e.g., stealth voice command injection attack using ultrasonic waves or adversarial examples, or attacks to crash drones in flight using malicious sound waves. Based on relevant previously reported findings, we first defined the requirements and design specifications of the CPFW framework. Then, we built a prototype CPFW framework and demonstrated its feasibility through extensive performance evaluations and case-study experiments using three real-world attacks; ultrasonic attacks (DolphinAttack), noise attacks (Audio Adversarial Examples), and resonant attacks (WALNUT).
AB - This work developed a new security framework named Cyber-Physical Firewall (CPFW), which provides a generic and flexible access control mechanism for regulating the malicious analog signals that target cyber-physical system (CPS) devices. This framework enables the defeat of various attacks that make use of malicious analog signals against CPS devices; e.g., stealth voice command injection attack using ultrasonic waves or adversarial examples, or attacks to crash drones in flight using malicious sound waves. Based on relevant previously reported findings, we first defined the requirements and design specifications of the CPFW framework. Then, we built a prototype CPFW framework and demonstrated its feasibility through extensive performance evaluations and case-study experiments using three real-world attacks; ultrasonic attacks (DolphinAttack), noise attacks (Audio Adversarial Examples), and resonant attacks (WALNUT).
KW - analog signal
KW - audio attacks
KW - cyber-physical system
KW - output
UR - http://www.scopus.com/inward/record.url?scp=85130758117&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85130758117&partnerID=8YFLogxK
U2 - 10.1145/3528416.3530997
DO - 10.1145/3528416.3530997
M3 - Conference contribution
AN - SCOPUS:85130758117
T3 - ACM International Conference Proceeding Series
SP - 296
EP - 304
BT - Proceedings of the 19th ACM International Conference on Computing Frontiers 2022, CF 2022
PB - Association for Computing Machinery
Y2 - 17 May 2022 through 19 May 2022
ER -