Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Teixeira, André, Associate ProfessorORCID iD iconorcid.org/0000-0001-5491-4068
Alternative names
Publications (10 of 65) Show all publications
Tosun, F. E., Teixeira, A. M. H., Dong, J., Ahlén, A. & Dey, S. (2025). Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems. IEEE Transactions on Information Forensics and Security, 20, 2763-2777
Open this publication in new window or tab >>Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems
Show others...
2025 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, p. 2763-2777Article in journal (Refereed) Published
Abstract [en]

This paper considers observer-based detection of sensor bias injection attacks (BIAs) on linear cyber-physical systems with single output driven by Gaussian noise. Despite their simplicity, BIAs pose a severe risk to systems with integrators, which we refer to as integrator vulnerability. Specifically, the residual generated by any linear observer is indistinguishable under attack and normal operation at steady-state, making BIAs detectable only during transients. To address this, we propose a principled method based on Kullback-Liebler divergence to design a residual generator that significantly increases the signal-to-noise ratio against BIAs. For systems without integrator vulnerability, our method also enables a trade-off between transient and steady-state detectability. The effectiveness of the proposed method is demonstrated through numerical comparisons with three state-of-the-art residual generators.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Cyber-physical systems, sensor deception attacks, bias injection attacks, observer-based anomaly detection
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-548790 (URN)10.1109/TIFS.2025.3546167 (DOI)001445058100001 ()2-s2.0-105001073632 (Scopus ID)
Funder
Swedish Research Council, 2018-04396Swedish Foundation for Strategic Research
Available from: 2025-01-28 Created: 2025-01-28 Last updated: 2025-04-14Bibliographically approved
Nguyen, A. T., Teixeira, A. M. H. & Medvedev, A. (2025). Security Allocation in Networked Control Systems under Stealthy Attacks. IEEE Transactions on Control of Network Systems, 12(1), 216-227
Open this publication in new window or tab >>Security Allocation in Networked Control Systems under Stealthy Attacks
2025 (English)In: IEEE Transactions on Control of Network Systems, E-ISSN 2325-5870, Vol. 12, no 1, p. 216-227Article in journal (Refereed) Published
Abstract [en]

In this article, we consider the problem of security allocation in a networked control system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary selects a single vertex on which to conduct a stealthy data injection attack with the purpose of maximally disrupting a distant target vertex while remaining undetected. Defense resources against the adversary are allocated by a defender on several selected vertices. First, the objectives of the adversary and the defender with uncertain targets are formulated in a probabilistic manner, resulting in an expected worst-case impact of stealthy attacks. Next, we provide a graph-theoretic necessary and sufficient condition under which the cost for the defender and the expected worst-case impact of stealthy attacks are bounded. This condition enables the defender to restrict the admissible actions to dominating sets of the graph representing the network. Then, the security allocation problem is solved through a Stackelberg game-theoretic framework. Finally, the obtained results are validated through a numerical example of a 50-vertex networked control system.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Cyber-physical security, networked control system, Stackelberg game, stealthy attack
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-522013 (URN)10.1109/TCNS.2024.3462546 (DOI)001449683500015 ()2-s2.0-85204464804 (Scopus ID)
Funder
Swedish Research Council, 2021-06316Swedish Foundation for Strategic Research
Available from: 2024-01-31 Created: 2024-01-31 Last updated: 2025-04-15Bibliographically approved
Nguyen, A. T., Hertzberg, A. & Teixeira, A. (2024). Centrality-based Security Allocation in Networked Control Systems. In: Lecture Notes in Computer Science: . Springer Publishing Company
Open this publication in new window or tab >>Centrality-based Security Allocation in Networked Control Systems
2024 (English)In: Lecture Notes in Computer Science, Springer Publishing Company, 2024Chapter in book (Refereed)
Abstract [en]

This paper addresses the security allocation problem within networked control systems, which consist of multiple interconnected control systems under the influence of two opposing agents: a defender and a malicious adversary. The adversary aims to maximize the worst-case attack impact on system performance while remaining undetected by launching stealthy data injection attacks on one or several interconnected control systems. Conversely, the defender's objective is to allocate security resources to detect and mitigate these worst-case attacks. A novel centrality-based approach is proposed to guide the allocation of security resources to the most connected or influential subsystems within the network. The methodology involves comparing the worst-case attack impact for both the optimal and centrality-based security allocation solutions. The results demonstrate that the centrality measure approach enables significantly faster allocation of security resources with acceptable levels of performance loss compared to the optimal solution, making it suitable for large-scale networks. The proposed method is validated through numerical examples using Erd®sRényi graphs.

Place, publisher, year, edition, pages
Springer Publishing Company, 2024
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-543721 (URN)
Available from: 2024-11-22 Created: 2024-11-22 Last updated: 2025-01-10Bibliographically approved
Wigren, T. & Teixeira, A. (2024). Delay Attack and Detection in Feedback Linearized Control Systems. In: 2024 European Control Conference (ECC): . Paper presented at European Control Conference, Stockholm, Sweden, 25-28 June, 2024 (pp. 1576-1583). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Delay Attack and Detection in Feedback Linearized Control Systems
2024 (English)In: 2024 European Control Conference (ECC), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 1576-1583Conference paper, Published paper (Refereed)
Abstract [en]

Delay injection attacks on nonlinear control systems may trigger instability mechanisms like finite escape time dynamics. The paper guards against such attacks by showing how a recursive algorithm for identification of nonlinear dynamics and delay can simultaneously provide parameter estimates for controller tuning and detection of delay injection in the feedback path. The attack methodology is illustrated using a simulated feedback linearized automotive cruise controller where the attack is disguised, but anyway rapidly detected.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Control Engineering
Research subject
Automatic Control
Identifiers
urn:nbn:se:uu:diva-535622 (URN)10.23919/ECC64448.2024.10590885 (DOI)001290216501081 ()2-s2.0-85200556799 (Scopus ID)9783907144107 (ISBN)9798331540920 (ISBN)
Conference
European Control Conference, Stockholm, Sweden, 25-28 June, 2024
Funder
Swedish Research Council, 2021-06316
Available from: 2024-08-05 Created: 2024-08-05 Last updated: 2025-04-15Bibliographically approved
Sun, Z., Teixeira, A. & Toor, S. (2024). GNN-IDS: Graph Neural Network based Intrusion Detection System. In: Proceedings of the 19th International Conference on Availability, Reliability and Security: . Paper presented at ARES 2024ARES, the 19th International Conference on Availability, Reliability and Security, JUL 30-AUG 02, 2024, Vienna, AUSTRIA. New York, NY, USA: Association for Computing Machinery (ACM), Article ID 14.
Open this publication in new window or tab >>GNN-IDS: Graph Neural Network based Intrusion Detection System
2024 (English)In: Proceedings of the 19th International Conference on Availability, Reliability and Security, New York, NY, USA: Association for Computing Machinery (ACM), 2024, article id 14Conference paper, Published paper (Refereed)
Abstract [en]

Intrusion detection systems (IDSs) are widely used to identify anomalies in computer networks and raise alarms on intrusive behaviors. ML-based IDSs generally take network traces or host logs as input to extract patterns from individual samples, whereas the inter-dependencies of network are often not captured and learned, which may result in large amounts of uncertain predictions, false positives, and false negatives. To tackle the challenges in intrusion detection, we propose a graph neural network-based intrusion detection system (GNN-IDS), which is data-driven and machine learning-empowered. In our proposed GNN-IDS, the attack graph and real-time measurements that represent static and dynamic attributes of computer networks, respectively, are incorporated and associated to represent complex computer networks. Graph neural networks are employed as the inference engine for intrusion detection. By learning network connectivity, graph neural networks can quantify the importance of neighboring nodes and node features to make more reliable predictions. Furthermore, by incorporating an attack graph, GNN-IDS could not only detect anomalies but also identify the malicious actions causing the anomalies. The experimental results on a use case network with two synthetic datasets (one generated from public IDS data) show that the proposed GNN-IDS achieves good performance. The results are analyzed from the aspects of uncertainty, explainability, and robustness.

Place, publisher, year, edition, pages
New York, NY, USA: Association for Computing Machinery (ACM), 2024
Keywords
Explainability, Graph Neural Network, Intrusion Detection System, Robustness, Uncertainty
National Category
Computer Systems
Research subject
Scientific Computing
Identifiers
urn:nbn:se:uu:diva-544329 (URN)10.1145/3664476.3664515 (DOI)001283894700038 ()2-s2.0-85200392088 (Scopus ID)9798400717185 (ISBN)
Conference
ARES 2024ARES, the 19th International Conference on Availability, Reliability and Security, JUL 30-AUG 02, 2024, Vienna, AUSTRIA
Projects
eSSENCE - An eScience Collaboration
Available from: 2024-12-03 Created: 2024-12-03 Last updated: 2025-02-03Bibliographically approved
Tosun, F. E., Teixeira, A., Ahlén, A. & Dey, S. (2024). Kullback-Leibler Divergence-Based Tuning of Kalman Filter for Bias Injection Attacks in an Artificial Pancreas System. Paper presented at 12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), June 4-7, 2024, Ferrara, Italy. IFAC-PapersOnLine, 58(4), 508-513
Open this publication in new window or tab >>Kullback-Leibler Divergence-Based Tuning of Kalman Filter for Bias Injection Attacks in an Artificial Pancreas System
2024 (English)In: IFAC-PapersOnLine, E-ISSN 2405-8963, Vol. 58, no 4, p. 508-513Article in journal (Refereed) Published
Abstract [en]

This paper considers constant bias injection attacks on the glucose sensor deployed in an artificial pancreas system. The main challenge with such apparently simple attacks is that they are detectable for only a limited duration if the system is linear and has an integrator. More formally put, such attacks are steady-state stealthy. To address this issue, we propose a method to design a bias-sensitive Kalman filter based on the Kullback-Leibler divergence metric. The resulting filter outperforms the nominal Kalman filter for attack detection as illustrated by numerical simulations on a realistic model.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Filtering and change detection, artificial pancreas, Kullback Leibler divergence, cyber physical systems security, sensor deception attack
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-540731 (URN)10.1016/j.ifacol.2024.07.269 (DOI)001296047100086 ()
Conference
12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), June 4-7, 2024, Ferrara, Italy
Funder
Swedish Research Council, 2018-04396Swedish Foundation for Strategic Research
Available from: 2024-10-21 Created: 2024-10-21 Last updated: 2024-10-21Bibliographically approved
Tosun, F. E., Teixeira, A., Abdalmoaty, M.-H. R. -., Ahlén, A. & Dey, S. (2024). Quickest detection of bias injection attacks on the glucose sensor in the artificial pancreas under meal disturbances. Journal of Process Control, 135, Article ID 103162.
Open this publication in new window or tab >>Quickest detection of bias injection attacks on the glucose sensor in the artificial pancreas under meal disturbances
Show others...
2024 (English)In: Journal of Process Control, ISSN 0959-1524, E-ISSN 1873-2771, Vol. 135, article id 103162Article in journal (Refereed) Published
Abstract [en]

Modern glucose sensors deployed in closed -loop insulin delivery systems, so-called artificial pancreas use wireless communication channels. While this allows a flexible system design, it also introduces vulnerability to cyberattacks. Timely detection and mitigation of attacks are imperative for device safety. However, large unknown meal disturbances are a crucial challenge in determining whether the sensor has been compromised or the sensor glucose trajectories are normal. We address this issue from a control -theoretic security perspective. In particular, a time -varying Kalman filter is employed to handle the sporadic meal intakes. The filter prediction error is then statistically evaluated to detect anomalies if present. We compare two state-of-the-art online anomaly detection algorithms, namely the ᅵᅵᅵᅵᅵᅵ2 and CUSUM tests. We establish a robust optimal detection rule for unknown bias injections. Even if the optimality holds only for the restrictive case of constant bias injections, we show that the proposed model -based anomaly detection scheme is also effective for generic non -stealthy sensor deception attacks through numerical simulations.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Type 1 diabetes mellitus, Artificial pancreas, Quickest change detection, Control-theoretic security, Sensor deception attack
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-525038 (URN)10.1016/j.jprocont.2024.103162 (DOI)001164643000001 ()
Funder
Swedish Research Council, 2018-04396Swedish Foundation for Strategic Research
Available from: 2024-03-27 Created: 2024-03-27 Last updated: 2025-02-02Bibliographically approved
Coimbatore Anand, S., Teixeira, A. & Ahlén, A. (2024). Risk Assessment of Stealthy Attacks on Uncertain Control Systems. IEEE Transactions on Automatic Control, 69(5), 3214-3221
Open this publication in new window or tab >>Risk Assessment of Stealthy Attacks on Uncertain Control Systems
2024 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 69, no 5, p. 3214-3221Article in journal (Refereed) Published
Abstract [en]

In this article, we address the problem of risk assessment of stealthy attacks on uncertain control systems. Considering the data injection attacks that aim at maximizing the impact while remaining undetected, we use the recently proposed output-to-output gain to characterize the risk associated with the impact of attacks under a limited system knowledge attacker. The risk is formulated using a well-established risk metric, namely the maximum expected loss. Under this setup, the risk assessment problem corresponds to an untractable infinite nonconvex optimization problem. To address this limitation, we adopt the framework of scenario-based optimization to approximate the infinite nonconvex optimization problem by a sampled nonconvex optimization problem. Then, based on the framework of dissipative system theory and S-procedure, the sampled nonconvex risk assessment problem is formulated as an equivalent convex semidefinite program. Additionally, we derive the necessary and sufficient conditions for the risk to be bounded. Finally, we illustrate the results through numerical simulation of a hydro-turbine power system.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-512904 (URN)10.1109/tac.2023.3318194 (DOI)001262903700061 ()
Funder
Swedish Research Council, 2018-04396Swedish Foundation for Strategic Research
Available from: 2023-09-29 Created: 2023-09-29 Last updated: 2024-08-19Bibliographically approved
Arnström, D. & Teixeira, A. (2024). Stealthy Deactivation of Safety Filters. In: 2024 European Control Conference, ECC 2024: . Paper presented at European Control Conference (ECC), June 25-28, 2024, Stockholm, Sweden (pp. 3077-3082). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Stealthy Deactivation of Safety Filters
2024 (English)In: 2024 European Control Conference, ECC 2024, Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 3077-3082Conference paper, Published paper (Refereed)
Abstract [en]

Safety filters ensure that only safe control actions are executed. We propose a simple and stealthy false-data injection attack for deactivating such safety filters; in particular, we focus on deactivating safety filters that are based on control-barrier functions. The attack injects false sensor measurements to bias state estimates to the interior of a safety region, which makes the safety filter accept unsafe control actions. To detect such attacks, we also propose a detector that detects biases manufactured by the proposed attack policy, which complements conventional detectors when safety filters are used. The proposed attack policy and detector are illustrated on a double integrator example.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-554588 (URN)10.23919/ECC64448.2024.10590978 (DOI)001290216502134 ()2-s2.0-85200606267 (Scopus ID)9798331540920 (ISBN)9783907144107 (ISBN)
Conference
European Control Conference (ECC), June 25-28, 2024, Stockholm, Sweden
Funder
Swedish Foundation for Strategic Research
Available from: 2025-04-15 Created: 2025-04-15 Last updated: 2025-04-15Bibliographically approved
Zhang, Q., Liu, K., Teixeira, A. M. H., Li, Y., Chai, S. & Xia, Y. (2023). An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems. IEEE Transactions on Automatic Control, 68(6), 3672-3679
Open this publication in new window or tab >>An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems
Show others...
2023 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 68, no 6, p. 3672-3679Article in journal (Refereed) Published
Abstract [en]

This article investigates the design of online stealthy attacks with the aim of moving the system's state to the desired target. Different from the design of offline attacks, which is only based on the system's model, to design the online attack, the attacker also estimates the system's state with the intercepted data at each instant and computes the optimal attack accordingly. To ensure stealthiness, the Kullback-Leibler divergence between the innovations with and without attacks at each instant should be smaller than a threshold. We show that the attacker should solve a convex optimization problem at each instant to compute the mean and covariance of the attack. The feasibility of the attack policy is also discussed. Furthermore, for the strictly stealthy case with zero threshold, the analytical expression of the unique optimal attack is given. Finally, a numerical example of the longitudinal flight control system is adopted to illustrate the effectiveness of the proposed attack.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
Detectors, Technological innovation, Kalman filters, Filtering theory, Symmetric matrices, Sensors, Automation, Kullback-Leibler divergence (KLD), online stealthy attack, security of the cyber-physical systems (CPSs)
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-507478 (URN)10.1109/TAC.2022.3192201 (DOI)000995899800040 ()
Funder
Swedish Research Council, 2018-04396.Swedish Foundation for Strategic Research
Available from: 2023-07-07 Created: 2023-07-07 Last updated: 2023-09-26Bibliographically approved
Projects
Analysis and design of secure and resilient control systems [2018-04396_VR]; Uppsala University; Publications
Tosun, F. E., Teixeira, A. M. H., Dong, J., Ahlén, A. & Dey, S. (2025). Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems. IEEE Transactions on Information Forensics and Security, 20, 2763-2777Tosun, F. E., Teixeira, A., Ahlén, A. & Dey, S. (2024). Kullback-Leibler Divergence-Based Tuning of Kalman Filter for Bias Injection Attacks in an Artificial Pancreas System. Paper presented at 12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), June 4-7, 2024, Ferrara, Italy. IFAC-PapersOnLine, 58(4), 508-513Tosun, F. E., Teixeira, A., Abdalmoaty, M.-H. R. -., Ahlén, A. & Dey, S. (2024). Quickest detection of bias injection attacks on the glucose sensor in the artificial pancreas under meal disturbances. Journal of Process Control, 135, Article ID 103162. Coimbatore Anand, S. & Teixeira, A. (2023). Risk-based Security Measure Allocation Against Actuator Attacks. IEEE Open Journal of Control Systems, 2, 297-309
Resilience, Safety, and Security in Tree-structured Civil Networks [2021-06316_VR]; Uppsala University; Publications
Nguyen, A. T., Teixeira, A. M. H. & Medvedev, A. (2025). Security Allocation in Networked Control Systems under Stealthy Attacks. IEEE Transactions on Control of Network Systems, 12(1), 216-227
Probabilistic Methods for Secure Learning and Control [2023-05234_VR]; Uppsala UniversitySOCRATES: Sensor and actuator selection for learning, estimation and control of fractional dynamical networks [2023-05178_VR]; Uppsala University
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5491-4068

Search in DiVA

Show all publications