@COMMENT This file was generated by bib2html.pl version 0.94 @COMMENT written by Patrick Riley @COMMENT This file came from Sanjit Seshia's publication pages at http://www.eecs.berkeley.edu/~sseshia @inproceedings{shoukry-smt15, author = {Yasser Shoukry and Pierluigi Nuzzo and Alberto Puggelli and Alberto L. Sangiovanni-Vincentelli and Sanjit A. Seshia and Mani Srivastava and Paulo Tabuada}, title = {{Imhotep-SMT}: A Satisfiability Modulo Theory Solver for Secure State Estimation}, booktitle = {In 13th International Workshop on Satisfiability Modulo Theories (SMT)}, month = "July", year = {2015}, OPTpages = {3--13}, abstract = {This paper presents Imhotep-SMT, a solver for the detection and mitigation of sensor attacks in cyber-physical systems. Imhotep-SMT receives as inputs a description of the physical system in the form of a linear difference equation, the system input (control) signal, and a set of output (sensor) measurements that can be noisy and corrupted by a malicious attacker. The output is the solution of the secure state estimation problem, i.e., a report indicating: (i) the corrupted sensors, and (ii) an estimate of the continuous state of the system obtained from the uncorrupted sensors. Based on this estimate, it is then possible to deploy a control strategy, while being resilient to adversarial attacks. The core of our tool relies on the combination of convex programming with pseudo-Boolean satisfiability solving, following the lazy satisfiability modulo theory paradigm. We provide an empirical evaluation of the tool scalability, and demonstrate its application to attack detection and secure state estimation of electric power grids.}, }