{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:54Z","timestamp":1774630254301,"version":"3.50.1"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T00:00:00Z","timestamp":1689206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"crossref","award":["FA9550-20-1-0074, FA9550-22-1-0054"],"award-info":[{"award-number":["FA9550-20-1-0074, FA9550-22-1-0054"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"crossref","award":["N00014-20-1-2636, N00014-23-1-2386"],"award-info":[{"award-number":["N00014-20-1-2636, N00014-23-1-2386"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Science Foundation","award":["CNS-1941670"],"award-info":[{"award-number":["CNS-1941670"]}]},{"name":"BIRD Foundation: Israel-US Energy Center, Cyber Topic"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2023,7,31]]},"abstract":"<jats:p>Cyber-physical systems (CPS) are required to satisfy safety constraints in various application domains such as robotics, industrial manufacturing systems, and power systems. Faults and cyber attacks have been shown to cause safety violations, which can damage the system and endanger human lives. Resilient architectures have been proposed to ensure safety of CPS under such faults and attacks via methodologies including redundancy and restarting from safe operating conditions. The existing resilient architectures for CPS utilize different mechanisms to guarantee safety, and currently, there is no common framework to compare them. Moreover, the analysis and design undertaken for CPS employing one architecture is not readily extendable to another. In this article, we propose a timing-based framework for CPS employing various resilient architectures and develop a common methodology for safety analysis and computation of control policies and design parameters. Using the insight that the cyber subsystem operates in one out of a finite number of statuses, we first develop a hybrid system model that captures CPS adopting any of these architectures. Based on the hybrid system, we formulate the problem of joint computation of control policies and associated timing parameters for CPS to satisfy a given safety constraint and derive sufficient conditions for the solution. Utilizing the derived conditions, we provide an algorithm to compute control policies and timing parameters relevant to the employed architecture. We also note that our solution can be applied to a wide class of CPS with polynomial dynamics and also allows incorporation of new architectures. We verify our proposed framework by performing a case study on adaptive cruise control of vehicles.<\/jats:p>","DOI":"10.1145\/3594638","type":"journal-article","created":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T12:05:31Z","timestamp":1682942731000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5595-9647","authenticated-orcid":false,"given":"Abdullah","family":"Al Maruf","sequence":"first","affiliation":[{"name":"Network Security Lab, Department of Electrical and Computer Engineering, University of Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8591-5522","authenticated-orcid":false,"given":"Luyao","family":"Niu","sequence":"additional","affiliation":[{"name":"Network Security Lab, Department of Electrical and Computer Engineering, University of Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5868-6186","authenticated-orcid":false,"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[{"name":"Electrical and Systems Engineering Department, McKelvey School of Engineering, Washington University in St. Louis, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0572-3737","authenticated-orcid":false,"given":"J. Sukarno","family":"Mertoguno","sequence":"additional","affiliation":[{"name":"School of Cybersecurity and Privacy, Georgia Institute of Technology, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-8097","authenticated-orcid":false,"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[{"name":"Network Security Lab, Department of Electrical and Computer Engineering, University of Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00010"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055012"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263706"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.43"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796030"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"e_1_3_1_8_2","unstructured":"Miguel Arroyo Hidenori Kobayashi Simha Sethumadhavan and Junfeng Yang. 2017. FIRED: Frequent inertial resets with diversification for emerging commodity cyber-physical systems. arXiv:1702.06595. Retrieved from https:\/\/arxiv.org\/abs\/1702.06595."},{"key":"e_1_3_1_9_2","first-page":"110090P","volume-title":"Autonomous systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019","author":"Arroyo Miguel A.","year":"2019","unstructured":"Miguel A. Arroyo, M. Tarek Ibn Ziad, Hidenori Kobayashi, Junfeng Yang, and Simha Sethumadhavan. 2019. YOLO: Frequently resetting cyber-physical systems for security. In Autonomous systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019, Vol. 11009. International Society for Optics and Photonics, 110090P."},{"key":"e_1_3_1_10_2","first-page":"99","volume-title":"15th IEEE Real-Time and Embedded Technology and Applications Symposium","author":"Bak Stanley","year":"2009","unstructured":"Stanley Bak, Deepti K. Chivukula, Olugbemiga Adekunle, Mu Sun, Marco Caccamo, and Lui Sha. 2009. The system-level simplex architecture for improved real-time embedded system safety. In 15th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 99\u2013107."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4606-6"},{"key":"e_1_3_1_12_2","first-page":"15","volume-title":"3rd Conference on Hot Topics in Security","volume":"5","author":"C\u00e1rdenas Alvaro A.","year":"2008","unstructured":"Alvaro A. C\u00e1rdenas, Saurabh Amin, and Shankar Sastry. 2008. Research challenges for the security of control systems. In 3rd Conference on Hot Topics in Security, Vol. 5. USENIX Association, 15."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9303896"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761260"},{"key":"e_1_3_1_17_2","unstructured":"Andy Greenberg. 2015. Hackers Remotely Kill a Jeep on the Highway\u2013with me in it. Retrieved from https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9028924"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/SP.2008.31","volume-title":"2008 IEEE Symposium on Security and Privacy (sp\u201908)","author":"Halperin Daniel","year":"2008","unstructured":"Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symposium on Security and Privacy (sp\u201908). IEEE, 129\u2013142."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263867"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_1_22_2","article-title":"Nonlinear systems, printice-hall","volume":"3","author":"Khalil H. K.","year":"1996","unstructured":"H. K. Khalil. 1996. Nonlinear systems, printice-hall. Upper Saddle River, NJ 3 (1996).","journal-title":"Upper Saddle River, NJ"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_1_25_2","unstructured":"M. Robert Lee J. Michael Assante and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Retrieved from https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2016\/05\/20081514\/E-ISAC_SANS_Ukraine_DUC_5.pdf."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"e_1_3_1_27_2","unstructured":"Tim Martin and Frank Allg\u00f6wer. 2021. Data-driven system analysis of nonlinear systems using polynomial approximation. arXiv:2108.11298. Retrieved from https:\/\/arxiv.org\/abs\/2108.11298."},{"key":"e_1_3_1_28_2","first-page":"110090E","volume-title":"Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019","author":"Mertoguno J. Sukarno","year":"2019","unstructured":"J. Sukarno Mertoguno, Ryan M. Craven, Matthew S. Mickelson, and David P. Koller. 2019. A physics-based strategy for cyber resilience of CPS. In Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019, Vol. 11009. International Society for Optics and Photonics, 110090E."},{"key":"e_1_3_1_29_2","volume-title":"Preprints of the 1st Workshop on Secure Control Systems","author":"Mo Yilin","year":"2010","unstructured":"Yilin Mo and Bruno Sinopoli. 2010. False data injection attacks in control systems. In Preprints of the 1st Workshop on Secure Control Systems, Vol. 1."},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461456"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814821"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9993062"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS54341.2022.00016"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2584651"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"e_1_3_1_36_2","first-page":"78","article-title":"Positive polynomials and sums of squares: Theory and practice","volume":"1","author":"Powers Victoria","year":"2011","unstructured":"Victoria Powers. 2011. Positive polynomials and sums of squares: Theory and practice. Real Algebraic Geometry 1 (2011), 78\u2013149.","journal-title":"Real Algebraic Geometry"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.902736"},{"key":"e_1_3_1_38_2","unstructured":"Zengyi Qin Kaiqing Zhang Yuxiao Chen Jingkai Chen and Chuchu Fan. 2021. Learning safe multi-agent control with decentralized neural barrier certificates. arXiv:2101.05436. Retrieved from https:\/\/arxiv.org\/abs\/2101.05436."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2020.12.2437"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8815155"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147388"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYSTOL.2010.5675979"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.23919\/ECC54610.2021.9655206"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2511722"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2019.12.002"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.10.005"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2008.03.008"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:08Z","timestamp":1750183748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,13]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7,31]]}},"alternative-id":["10.1145\/3594638"],"URL":"https:\/\/doi.org\/10.1145\/3594638","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,13]]},"assertion":[{"value":"2022-08-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}