{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:16:37Z","timestamp":1768342597728,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T00:00:00Z","timestamp":1588809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T00:00:00Z","timestamp":1588809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Singapore Ministry of Education Academic Research Grant","award":["RG91\/18-(S)"],"award-info":[{"award-number":["RG91\/18-(S)"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discrete Event Dyn Syst"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10626-020-00312-2","type":"journal-article","created":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T22:02:31Z","timestamp":1588888951000},"page":"561-577","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Synthesis of covert actuator attackers for free"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8363-584X","authenticated-orcid":false,"given":"Liyong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuting","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,7]]},"reference":[{"key":"312_CR1","doi-asserted-by":"crossref","unstructured":"Amin S, Litrico X, Sastry SS, Bayen AM (2010) Stealthy deception attacks on water SCADA systems. HSCC: 161\u2013170","DOI":"10.1145\/1755952.1755976"},{"issue":"1","key":"312_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0304-3975(02)00442-5","volume":"303","author":"A Arnold","year":"2003","unstructured":"Arnold A, Vincent A, Walukiewicz I (2003) Games for synthesis of controllers with partial observation. Theor Comp Sci 303(1):7\u201334","journal-title":"Theor Comp Sci"},{"issue":"6","key":"312_CR3","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1051\/ita\/1993270605551","volume":"27","author":"A Bergeron","year":"1993","unstructured":"Bergeron A (1993) A unified approach to control problems in discrete event processes. RAIRO-Theoretical Informatics and Applications 27(6):555\u2013573","journal-title":"RAIRO-Theoretical Informatics and Applications"},{"key":"312_CR4","doi-asserted-by":"crossref","unstructured":"Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. WODES: 298\u2013305","DOI":"10.1109\/WODES.2016.7497863"},{"key":"312_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.automatica.2018.07.017","volume":"97","author":"LK Carvalho","year":"2018","unstructured":"Carvalho LK, Wu YC, Kwong R, Lafortune S (2018) Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97:121\u2013133","journal-title":"Automatica"},{"key":"312_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4070-7","volume-title":"Introduction to discrete event systems","author":"C Cassandras","year":"1999","unstructured":"Cassandras C, Lafortune S (1999) Introduction to discrete event systems. Kluwer, Boston"},{"key":"312_CR7","doi-asserted-by":"crossref","unstructured":"Forejt V, Kwiatkowska M, Norman G, Parker D (2011) Automated verification techniques for probabilistic systems. SFM: 53\u2013113","DOI":"10.1007\/978-3-642-21455-4_3"},{"key":"312_CR8","doi-asserted-by":"crossref","unstructured":"Goes RM, Kang E, Kwong R, Lafortune S (2017) Stealthy deception attacks for cyber-physical systems. Conference on Decision and Control: 4224\u20134230","DOI":"10.1109\/CDC.2017.8264281"},{"issue":"7","key":"312_CR9","first-page":"464","volume":"51","author":"L H\u00e9lou\u00ebt","year":"2018","unstructured":"H\u00e9lou\u00ebt L, Marchand H, Ricker L (2018) Opacity with powerful attackers. IFAC 51(7):464\u2013471","journal-title":"IFAC"},{"key":"312_CR10","volume-title":"Introduction to automata theory, languages, and computation","author":"JE Hopcroft","year":"1979","unstructured":"Hopcroft JE, Ullman JD (1979) Introduction to automata theory, languages, and computation. Addison-Wesley, Reading"},{"key":"312_CR11","doi-asserted-by":"crossref","unstructured":"Jones A, Kong Z, Belta C (2014) Anomaly detection in cyber-physical systems: a formal methods approach. Conference on Decision and Control: 848\u2013853","DOI":"10.1109\/CDC.2014.7039487"},{"key":"312_CR12","doi-asserted-by":"crossref","unstructured":"Kang E, Adepu S, Mathur A, Jackson D (2016) Model based security analysis of a water treatment system. SEsCPS: 22\u201328","DOI":"10.1145\/2897035.2897041"},{"key":"312_CR13","doi-asserted-by":"crossref","unstructured":"Lanotte R, Merro M, Muradore R, Vigano L (2017) A formal approach to cyber-physical attacks. IEEE Computer Security Foundations Symposium: 436\u2013450","DOI":"10.1109\/CSF.2017.12"},{"issue":"1","key":"312_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10626-008-0054-3","volume":"20","author":"F Lei","year":"2010","unstructured":"Lei F, Wonham WM (2010) On the computation of natural observers in discrete-event systems. Discrete Event Dynamic Systems 20(1):63\u2013102","journal-title":"Discrete Event Dynamic Systems"},{"issue":"1","key":"312_CR15","first-page":"12333","volume":"50","author":"PM Lima","year":"2017","unstructured":"Lima PM, Alves MVS, Carvalho LK, Moreira MV (2017) Security against network attacks in supervisory control systems. IFAC 50(1):12333\u201312338","journal-title":"IFAC"},{"issue":"7","key":"312_CR16","first-page":"179","volume":"51","author":"PM Lima","year":"2018","unstructured":"Lima PM, Carvalho LK, Moreira MV (2018) Detectable and undetectable network attack security of cyber-physical systems. IFAC 51(7):179\u2013185","journal-title":"IFAC"},{"key":"312_CR17","doi-asserted-by":"crossref","unstructured":"Lin L, Thuijsman S, Zhu Y, Ware S, Su R, Reniers M (2019a) Synthesis of successful normal actuator attackers on normal supervisors. American Control Conference: 5614\u20135619","DOI":"10.23919\/ACC.2019.8814712"},{"key":"312_CR18","doi-asserted-by":"crossref","unstructured":"Lin L, Zhu Y, Su R (2019b) Towards bounded synthesis of resilient supervisors. Conference on Decision and Control, accepted","DOI":"10.1109\/CDC40024.2019.9030171"},{"key":"312_CR19","doi-asserted-by":"crossref","unstructured":"Mo Y, Kim HJ, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2012) Cyber-physical security of a smart grid infrastructure. Proc. IEEE: 195\u2013209","DOI":"10.1109\/JPROC.2011.2161428"},{"issue":"11","key":"312_CR20","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti F, Dorfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11):2715\u20132729","journal-title":"IEEE Trans. Autom. Control"},{"key":"312_CR21","doi-asserted-by":"crossref","unstructured":"Rashidinejad A, Lin L, Wetzels BHJ, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. European Control Conference, accepted","DOI":"10.23919\/ECC.2019.8795849"},{"key":"312_CR22","doi-asserted-by":"crossref","unstructured":"Rocchetto M, Tippenhauer NO (2017) Towards formal security analysis of industrial control systems. ACM Asia Conference on Computer and Communications Security: 114\u2013126","DOI":"10.1145\/3052973.3053024"},{"key":"312_CR23","doi-asserted-by":"crossref","unstructured":"Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC: 90\u201395","DOI":"10.3182\/20110828-6-IT-1002.01721"},{"key":"312_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","volume":"94","author":"R Su","year":"2018","unstructured":"Su R (2018) Supervisor synthesis to thwart cyber-attack with bounded sensor reading alterations. Automatica 94:35\u201344","journal-title":"Automatica"},{"key":"312_CR25","doi-asserted-by":"crossref","unstructured":"Teixeira A, Shames I, Sandberg H, Johansson KH (2012) Revealing stealthy attacks in control systems. 50th Annual Allerton conference on communication, control and computing","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"312_CR26","unstructured":"Wakaiki M, Tabuada P, Hespanha JP (2017) Supervisory control of discrete-event systems under attacks. arXiv:1701.00881v1"},{"key":"312_CR27","unstructured":"Wang Y, Bozkurt AK, Pajic M (2019) Attack-resilient supervisory control of discrete-event systems. arXiv:1904.03264"},{"key":"312_CR28","doi-asserted-by":"crossref","unstructured":"Wonham WM, Cai K (2018) Supervisory control of discrete-event systems. Monograph Series Communications and Control Engineering, Springer","DOI":"10.1007\/978-3-319-77452-7"},{"issue":"5","key":"312_CR29","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TAC.2015.2460391","volume":"61","author":"X Yin","year":"2016","unstructured":"Yin X, Lafortune S (2016) Synthesis of maximally permissive supervisors for partially observed discrete event systems. IEEE Trans Autom Control 61(5):1239\u20131254","journal-title":"IEEE Trans Autom Control"},{"key":"312_CR30","doi-asserted-by":"crossref","unstructured":"Yin X, Li S (2018) Verification of opacity in networked supervisory control systems with insecure control channels. Conference on Decision and Control: 4851\u20134856","DOI":"10.1109\/CDC.2018.8619851"},{"key":"312_CR31","doi-asserted-by":"crossref","unstructured":"Zhu Y, Lin L, Su R (2018) Supervisor obfuscation against actuator enablement attack. European Control Conference: 1732\u20131739","DOI":"10.23919\/ECC.2019.8795844"},{"key":"312_CR32","doi-asserted-by":"crossref","unstructured":"Zhu Y, Lin L, Ware S, Su R (2019) Supervisor synthesis for networked discrete event systems with communication delays and lossy channels. Conference on decision and control, accepted","DOI":"10.1109\/CDC40024.2019.9029888"}],"container-title":["Discrete Event Dynamic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-020-00312-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10626-020-00312-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-020-00312-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T23:38:41Z","timestamp":1620344321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10626-020-00312-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,7]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["312"],"URL":"https:\/\/doi.org\/10.1007\/s10626-020-00312-2","relation":{},"ISSN":["0924-6703","1573-7594"],"issn-type":[{"value":"0924-6703","type":"print"},{"value":"1573-7594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,7]]},"assertion":[{"value":"28 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}