Stealthy Computational Delay Attacks on Control Systems
(2025) p.1-11- Abstract
- Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without... (More)
- Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.
We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity. (Less) - Abstract (Swedish)
- Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without... (More)
- Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.
We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity.
(Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/e2d7da4c-b655-427b-8341-1829ae1821e9
- author
- Nauta, Talitha
LU
; Sandberg, Henrik and Maggio, Martina LU
- organization
- publishing date
- 2025-05-07
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- ICCPS '25: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems
- article number
- 9
- pages
- 11 pages
- publisher
- Association for Computing Machinery (ACM)
- external identifiers
-
- scopus:105007300360
- ISBN
- 979-8-4007-1498-6
- DOI
- 10.1145/3716550.3722013
- project
- DYNamic Attack detection and mitigation for seCure autONomy
- language
- English
- LU publication?
- yes
- id
- e2d7da4c-b655-427b-8341-1829ae1821e9
- date added to LUP
- 2025-07-04 11:54:52
- date last changed
- 2025-07-08 10:02:21
@inproceedings{e2d7da4c-b655-427b-8341-1829ae1821e9, abstract = {{Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.<br/><br/>We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity.}}, author = {{Nauta, Talitha and Sandberg, Henrik and Maggio, Martina}}, booktitle = {{ICCPS '25: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems}}, isbn = {{979-8-4007-1498-6}}, language = {{eng}}, month = {{05}}, pages = {{1--11}}, publisher = {{Association for Computing Machinery (ACM)}}, title = {{Stealthy Computational Delay Attacks on Control Systems}}, url = {{http://dx.doi.org/10.1145/3716550.3722013}}, doi = {{10.1145/3716550.3722013}}, year = {{2025}}, }