<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bradley Potteiger</style></author><author><style face="normal" font="default" size="100%">William A. Emfinger</style></author><author><style face="normal" font="default" size="100%">Neema, Himanshu</style></author><author><style face="normal" font="default" size="100%">Xenofon Kousoukos</style></author><author><style face="normal" font="default" size="100%">CheeYee Tang</style></author><author><style face="normal" font="default" size="100%">Keith Stouffer</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed</style></title><secondary-title><style face="normal" font="default" size="100%">Resilience Week (RWS)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">actuation capability</style></keyword><keyword><style  face="normal" font="default" size="100%">Analytical models</style></keyword><keyword><style  face="normal" font="default" size="100%">Computational modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">CPS attack experiments</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber components</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber physical systems</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-attack effect evaluation</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber-physical system</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber-Physical Systems</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity design process</style></keyword><keyword><style  face="normal" font="default" size="100%">embedded computers</style></keyword><keyword><style  face="normal" font="default" size="100%">embedded systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Experimentation</style></keyword><keyword><style  face="normal" font="default" size="100%">Hardware</style></keyword><keyword><style  face="normal" font="default" size="100%">hardware-in-the loop simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Hardware-in-the-Loop</style></keyword><keyword><style  face="normal" font="default" size="100%">hardware-in-the-loop simulation testbed</style></keyword><keyword><style  face="normal" font="default" size="100%">HIL testbed</style></keyword><keyword><style  face="normal" font="default" size="100%">model based software development framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Model Integrated Computing</style></keyword><keyword><style  face="normal" font="default" size="100%">physical components</style></keyword><keyword><style  face="normal" font="default" size="100%">physical system</style></keyword><keyword><style  face="normal" font="default" size="100%">platform specific performance measurements</style></keyword><keyword><style  face="normal" font="default" size="100%">railway transportation system</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security of data</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation environment</style></keyword><keyword><style  face="normal" font="default" size="100%">Software</style></keyword><keyword><style  face="normal" font="default" size="100%">software engineering</style></keyword><keyword><style  face="normal" font="default" size="100%">system functions</style></keyword><keyword><style  face="normal" font="default" size="100%">Testbed</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerability Assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2017</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.ieeeexplore.ws/stamp/stamp.jsp?tp=&amp;arnumber=8088669&amp;isnumber=8088637</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pub-location><style face="normal" font="default" size="100%">Wilmington, DE</style></pub-location><pages><style face="normal" font="default" size="100%">177-183</style></pages><abstract><style face="normal" font="default" size="100%">Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system functions properly and safely. However, the effects of a cyberattack on the whole system may be difficult to determine, analyze, and therefore detect and mitigate. This work presents a model based software development framework integrated with a hardware-in-the-loop (HIL) testbed for rapidly deploying CPS attack experiments. The framework provides the ability to emulate low level attacks and obtain platform specific performance measurements that are difficult to obtain in a traditional simulation environment. The framework improves the cybersecurity design process which can become more informed and customized to the production environment of a CPS. The developed framework is illustrated with a case study of a railway transportation system.</style></abstract></record></records></xml>