Repository logo
 

Mitigation of Cyber-Physical Attacks in Industry 4.0 Using Secure Function Blocks

aut.relation.conferenceMEMOCODE '25: International Symposium on Formal Methods and Models for System Design
aut.relation.endpage27
aut.relation.startpage16
dc.contributor.authorWu, Steph
dc.contributor.authorAllen, Nathan
dc.contributor.authorBaird, Alex
dc.contributor.authorPearce, Hammond
dc.contributor.authorRoop, Partha
dc.contributor.editorGuan, N
dc.contributor.editorPagetti, C
dc.contributor.editorChattopadhyay, S
dc.contributor.editorPinisetty, S
dc.date.accessioned2026-01-15T01:34:25Z
dc.date.available2026-01-15T01:34:25Z
dc.date.issued2025-12-29
dc.description.abstractAs Industry 4.0 drives the Fourth Industrial Revolution, Cyber-Physical Systems (CPSs) have become central to industrial automation. These systems integrate software with physical processes, significantly improving the efficiency and adaptability. However, this integration also expands the attack surface, exposing systems to Cyber-Physical-attacks (CP-attacks) that can target either the computational components, physical devices, or both. The impact of such attacks can be catastrophic, ranging from system disruption to physical damage. Although numerous techniques have been developed to detect and mitigate these threats, industrial standards are often not incorporated into the design of these methods. This limits their deployment within the Industry 4.0 systems, where standard compliance is critical. To this end, we extend IEC 61499, an emerging standard being considered in Industry 4.0, that uses reusable artefacts called function blocks. We formalise the mitigation of CP-attacks using a novel method based on Bi-directional Runtime Enforcement (Bi-RE) using a standards compliant approach called Secure Function Blocks (SFBs). This approach automatically generates the necessary enforcers from a timed specification language called Valued Discrete Timed Automaton (VDTA). We illustrate our approach using the case study of a water treatment system, and highlight the low overhead associated with it. This approach allows for runtime techniques to be applied with minimal changes to many Industry 4.0 applications.
dc.identifier.citationProceedings of the International Symposium on Formal Methods and Models for System Design. Pages 16 - 27. MEMOCODE ’25, September 28-October 3, 2025, Taipei, Taiwan. ISBN 979-8-4007-1994-3/2025/09
dc.identifier.doi10.1145/3742875.3754685
dc.identifier.isbn9798400719943
dc.identifier.urihttp://hdl.handle.net/10292/20504
dc.publisherACM
dc.relation.urihttps://dl.acm.org/doi/10.1145/3742875.3754685
dc.rightsPermission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). © 2025 Copyright held by the owner/author(s). As of January 1, 2026, all ACM publications and related artifacts in the ACM Digital Library are now open access.
dc.rights.accessrightsOpenAccess
dc.subject46 Information and Computing Sciences
dc.subject40 Engineering
dc.subject4604 Cybersecurity and Privacy
dc.subject9 Industry, Innovation and Infrastructure
dc.subjectIEC61499
dc.subjectCyber-Physical security
dc.subjectFunction Blocks
dc.subjectRuntime Enforcement
dc.titleMitigation of Cyber-Physical Attacks in Industry 4.0 Using Secure Function Blocks
dc.typeConference Contribution
pubs.elements-id749823

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wu et al_2025_Mitigation of cyber physical attacks.pdf
Size:
3.11 MB
Format:
Adobe Portable Document Format
Description:
Conference paper

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.37 KB
Format:
Plain Text
Description: