{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:38Z","timestamp":1750309358818,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-2333980"],"award-info":[{"award-number":["CNS-2333980"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2024,9,30]]},"abstract":"<jats:p>\n            There are various applications of Cyber-Physical systems (CPSs) that are life-critical where failure or malfunction can result in significant harm to human life, the environment, or substantial economic loss. Therefore, it is important to ensure their reliability, security, and robustness to the attacks. However, there is no widely used toolbox to simulate CPS and target security problems, especially the simulation of sensor attacks and defense strategies against them. In this work, we introduce our toolbox CPSim, a user-friendly simulation toolbox for security problems in CPS. CPSim aims to simulate common sensor attacks and countermeasures to these sensor attacks. We have implemented bias attacks, delay attacks, and replay attacks. Additionally, we have implemented various recovery-based methods against sensor attacks. The sensor attacks and recovery methods configurations can be customized with the given APIs. CPSim has built-in numerical simulators and various implemented benchmarks. Moreover, CPSim is compatible with other external simulators and can be deployed on a real testbed for control purposes.\n            <jats:xref ref-type=\"fn\">\n              <jats:sup>1<\/jats:sup>\n            <\/jats:xref>\n          <\/jats:p>\n          <jats:p\/>","DOI":"10.1145\/3674904","type":"journal-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T11:51:55Z","timestamp":1719316315000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CPSim: Simulation Toolbox for Security Problems in Cyber-Physical Systems"],"prefix":"10.1145","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3532-9506","authenticated-orcid":false,"given":"Mengyu","family":"Liu","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3708-9056","authenticated-orcid":false,"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2466-0241","authenticated-orcid":false,"given":"Weizhe","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9137-2359","authenticated-orcid":false,"given":"Shixiong","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6488-3488","authenticated-orcid":false,"given":"Fanxin","family":"Kong","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00027"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808715"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.016"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2646418"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2301639"},{"key":"e_1_3_3_7_2","volume-title":"Proceedings of the 1st Workshop on Secure Control Systems","author":"Chabukswar Rohan","year":"2010","unstructured":"Rohan Chabukswar, Bruno Sinopoli, Gabor Karsai, Annarita Giani, Himanshu Neema, and Andrew Davis. 2010. Simulation of network attacks on SCADA systems. In Proceedings of the 1st Workshop on Secure Control Systems."},{"key":"e_1_3_3_8_2","first-page":"349","volume-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920)","author":"Choi Hongjun","year":"2020","unstructured":"Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, and Dongyan Xu. 2020. Software-based realtime recovery from sensor attacks on robotic vehicles. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920). 349\u2013364."},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119994138"},{"key":"e_1_3_3_11_2","first-page":"24","article-title":"A nonlinear model library for dynamics and control","volume":"7","author":"Hedengren John D.","year":"2008","unstructured":"John D. Hedengren. 2008. A nonlinear model library for dynamics and control. Yeast 7 (2008), 24.","journal-title":"Yeast"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2004.1389727"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00011"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453652"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS55097.2022.00029"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS59052.2023.00017"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3653974"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012648"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2612119"},{"key":"e_1_3_3_21_2","unstructured":"Automotive News. 2023. Tesla Model 3 hacked by cybersecurity team in minutes. Retrieved from https:\/\/www.autonews.com\/mobility-report\/tesla-model-3-hacked-cybersecurity-team-minutes"},{"key":"e_1_3_3_22_2","unstructured":"The Hacker News. 2016. Hacker Hijacks a Police Drone from 2 Km Away with $40 Kit. Retrieved from https:\/\/thehackernews.com\/2016\/04\/hacking-drone.html"},{"key":"e_1_3_3_23_2","first-page":"895","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing autonomous vehicles with robust physical invariants. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). 895\u2013912."},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294422"},{"key":"e_1_3_3_26_2","unstructured":"Asgeir J S\u00f8rensen. 2005. Marine cybernetics. Lecture Notes for TMR4240 Marine Control Systems Dept. Of Marine Tehcnology NTNU Citeseer. Trondheim Norway. http:\/\/www.ivt.ntnu.no\/imt\/courses\/tmr4240"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2018.11.008"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85248-1_15"},{"key":"e_1_3_3_29_2","unstructured":"WIRED. 2022. Security News This Week: Attackers Keep Targeting the US Electric Grid. Retrieved from https:\/\/www.wired.com\/story\/attacks-us-electrical-grid-security-roundup\/"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016826"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MECO49872.2020.9134351"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS49844.2020.00028"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS58335.2023.00040"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS58335.2023.00024"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530555"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674904","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:56Z","timestamp":1750291556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,30]]}},"alternative-id":["10.1145\/3674904"],"URL":"https:\/\/doi.org\/10.1145\/3674904","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2024,9,4]]},"assertion":[{"value":"2023-11-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}