Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Stealthy Computational Delay Attacks on Control Systems

Nauta, Talitha LU orcid ; Sandberg, Henrik and Maggio, Martina LU (2025) p.1-11
Abstract
Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without... (More)
Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.

We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity. (Less)
Abstract (Swedish)
Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without... (More)
Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.

We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity.
(Less)
Please use this url to cite or link to this publication:
author
; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
ICCPS '25: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems
article number
9
pages
11 pages
publisher
Association for Computing Machinery (ACM)
external identifiers
  • scopus:105007300360
ISBN
979-8-4007-1498-6
DOI
10.1145/3716550.3722013
project
DYNamic Attack detection and mitigation for seCure autONomy
language
English
LU publication?
yes
id
e2d7da4c-b655-427b-8341-1829ae1821e9
date added to LUP
2025-07-04 11:54:52
date last changed
2025-07-08 10:02:21
@inproceedings{e2d7da4c-b655-427b-8341-1829ae1821e9,
  abstract     = {{Cyber-Physical Systems (CPS) are integral to critical infrastructure, but their interconnected nature exposes them to sophisticated cyber threats. Traditional security mechanisms primarily focus on detecting direct manipulations of control signals or sensor data, leaving them vulnerable to more subtle attack vectors. This paper introduces a novel optimisation framework for modelling and executing stealthy computational delay attacks---an attack class that subtly interferes with controller execution timing to degrade system performance while remaining undetected. Unlike conventional denial-of-service attacks, these stealthy attacks introduce delays selectively, ensuring that the controller fails to compute control signals in time without triggering standard anomaly detection mechanisms.<br/><br/>We formulate the problem as a Mixed Integer Quadratically Constrained Programming (MIQCP) optimisation, allowing attackers to maximise system disruption while evading detection. Our framework is evaluated on two control systems: a simulated stable quadruple-tank process and a real-hardware implementation of an unstable Furuta pendulum. Experimental results demonstrate that even brief, undetected computational delays can lead to severe performance degradation and system destabilisation. These findings highlight the need for improved intrusion detection mechanisms that account for time-based threats, emphasising long-term activity monitoring and adaptive defence strategies to safeguard CPS integrity.}},
  author       = {{Nauta, Talitha and Sandberg, Henrik and Maggio, Martina}},
  booktitle    = {{ICCPS '25: Proceedings of the ACM/IEEE 16th International Conference on Cyber-Physical Systems}},
  isbn         = {{979-8-4007-1498-6}},
  language     = {{eng}},
  month        = {{05}},
  pages        = {{1--11}},
  publisher    = {{Association for Computing Machinery (ACM)}},
  title        = {{Stealthy Computational Delay Attacks on Control Systems}},
  url          = {{http://dx.doi.org/10.1145/3716550.3722013}},
  doi          = {{10.1145/3716550.3722013}},
  year         = {{2025}},
}