Mo, Yilin edited attack.tex  over 8 years ago

Commit id: 3dc4d0ffa79993727bb7172b8c7f26a2e1dc2108

deletions | additions      

       

\subsection{What can the attacker do after KPA?}  \label{sec:stealthy}  In this section, we briefly describe a stealthy attack on the CPS after the adversary has obtained the transfer function $\mG(z)$. The goal of this subsection is to demonstrate that KPA can enable other attacks discussed in the literature. For more detailed discuss on stealthy attack, please refer to~\cite{Pasqualetti2013}. to~\cite{Pasqualetti_2013}.  We assume that the adversary compromised a subset of actuators and sensors and can change the corresponding control inputs and sensor measurements respectively. As a result, the system equation becomes:  \begin{align*}