JOURNAL ARTICLE

A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems

Abstract

In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.

Keywords:
Cyber-physical system Computer science Covert Reachability Computer security Cyber-attack Algorithm

Metrics

3
Cited By
0.44
FWCI (Field Weighted Citation Impact)
17
Refs
0.64
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Smart Grid Security and Resilience
Physical Sciences →  Engineering →  Control and Systems Engineering
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Optimal Stealthy Deception Attack Against Cyber-Physical Systems

Qirui ZhangKun LiuYuanqing XiaAoyun Ma

Journal:   IEEE Transactions on Cybernetics Year: 2019 Vol: 50 (9)Pages: 3963-3972
JOURNAL ARTICLE

Undetectable Finite-Time Covert Attack on Constrained Cyber-Physical Systems

Kian GheitasiWalter Lúcia

Journal:   IEEE Transactions on Control of Network Systems Year: 2022 Vol: 9 (2)Pages: 1040-1048
JOURNAL ARTICLE

Model reference observer based stealthy covert attack on cyber-physical systems

Xuerong LiPing ZhangHongli Dong

Journal:   Journal of the Franklin Institute Year: 2025 Vol: 363 (1)Pages: 108271-108271
JOURNAL ARTICLE

Historical residual-based stealthy attack against cyber–physical systems

Li-Wei MaoGuang‐Hong Yang

Journal:   Neurocomputing Year: 2025 Vol: 650 Pages: 130868-130868
© 2026 ScienceGate Book Chapters — All rights reserved.