Skip to main content
Till KTH:s startsida Till KTH:s startsida

EL2850 Cyber-Physical Security in Time-Critical Systems 7.5 credits

Course memo Autumn 2023-51295

Version 1 – 08/23/2023, 11:01:31 AM

Course offering

Autumn 2023-51295 (Start date 28 Aug 2023, English)

Language Of Instruction

English

Offered By

EECS/Intelligent Systems

Course memo Autumn 2023

Headings denoted with an asterisk ( * ) is retrieved from the course syllabus version Autumn 2022

Content and learning outcomes

Course contents

The course covers safety aspects in cyber-physical systems. Particularly, time-critical systems in critical infrastructure and autonomous systems are studied, where cyberattacks and errors can have physical consequences. A large part of the course is devoted to presentation by basic principles and methods for modelling, analysis and detection of errors and cyberattacks in dynamic system. In particular, the following is studied

  • Documented attacks against cyber-physical systems, system architectures, safety and accessibility, risk management and attack-space in cyber-physical systems.
  • Model-based quantification of physical consequences of errors and cyberattacks, discrete-time dynamic systems (linear state models), observers, strong observability and detectability.
  • Model and data-based error detection, fault identification and redundancy, parity space methods, observer based methods, setting of threshold.
  • Statistical anomaly detection, hypothesis testing, Neyman-Pearson's lemma, generalised likelihood ratio (GLR), Bayes' theorem, principal component analysis (PCA), detection of abrupt process changes, cumulative sum test (CUSUM), machine-learning based methods.

Intended learning outcomes

After passing the course, the student shall be able to

  • formulate basic theory and definitions of important concepts in safety in cyber-physical systems in general and time-critical systems in particular
  • apply model and data-based methods for safety in cyber-physical systems particularly for time-critical systems.

Learning activities

  • Lectures: Review and introduction of basic theory and definitions of important concepts in safety in cyber-physical systems in general and time-critical systems in particular.
  • Exercises: Practice application of model and data-based methods for safety in cyber-physical systems, particularly for time-critical systems, together with teacher assistant (TA).
  • Assignments:
    • INL1: Demonstrate ability to apply model and data-based methods for safety in cyber-physical systems, particularly for time-critical systems. Individiually solve problems and hand in for assessment.
    • INL2: Demonstrate ability to formulate basic theory and definitions of important concepts in safety in cyber-physical systems in general, and time-critical systems in particular. Individiually write essay and present in class.
  • Written exam (TEN1): Demonstrate ability to apply model and data-based methods for safety in cyber-physical systems particularly for time-critical systems, and formulate basic theory and definitions of important concepts. Individual solution of exam problems.

Detailed plan

Course Modules: The course is organized into three modules:

  • M1: Cyber-physical systems (CPSs) safety and security
  • M2: Dynamical systems and anomaly detection/identification
  • M3: Statistical tools

Lectures:

L# M# Date Topic Reading
L1 M1 Aug 28 Introduction to course and CPS security AC: all
L2 M1 Aug 30 Fault-tolerance and dependability ED: Ch 1-2, 3.1
L3 M1 Sep 4 Failure rate and voting mechanisms

ED: Ch 3.2-4, 4.1-2

SS: Ch 5.1

L4 M1 Sep 6 Active redundancy, information redundancy

ED: Ch 4.3

SS: 5.2.1

L5 M2 Sep 11 Control systems and dynamical models SS: Ch 1, 2.1-2.5, skip 2.4.1
L6 M2 Sep 13

CPS attack models and controllability

SS: Ch. 2.6.1

HS

L7 M2 Sep 18 Observability and invertibility SS (Ch 2.6, 2.8, 2.9, skip 2.6.5 and 2.8.2 )
L8 M2 Sep 20 Unknown input observers SS (Ch 3)
L9 M2 Sep 25 Attack detection and identification, parity space methods (part 1) SS (Ch 4)
L10 M3 Sep 27 Attack detection and identification, parity space methods (part 2) SS (Ch 4)
L11 M3 Oct 2 Threshold setting, hypothesis test (part 1) HS
L12 M3 Oct 4 Threshold setting, hypothesis test (part 2) HS
L13 M3 Oct 9 Quickest change detection, CUSUM test HS
L14   Oct 11 Course summary. Student presentations  
  • [AC] Alvaro Cardenas, "Cyber-Physical Systems Security Knowledge Area," CyBOK, 2021.  [Link]
  • [ED] Elena Dubrova, "Fault-Tolerant Design," Springer, 2013. [Link]
  • [SS] Shreyas Sundaram, "Fault-Tolerant and Secure Control Systems," Lecture Notes, 2012. [Link]
  • [HS] Henrik Sandberg, "EL2850 Lecture Notes," KTH, 2023. [Made available in Canvas]

Exercises: See Canvas and Schedule [link]

Assignments: INL1 are due by the end of each module. INL2 is due by the last lecture.

Written exam: Ordinary exam Oct 19 at 8:00-13:00. Re-exam Dec 21 at 8:00-13:00.

 

 

Preparations before course start

Literature

Parts of the following texts are covered in the course (see Reading in the Lectures table):

  • [AC] Alvaro Cardenas, "Cyber-Physical Systems Security Knowledge Area," CyBOK, 2021.  [Link]
  • [ED] Elena Dubrova, "Fault-Tolerant Design," Springer, 2013. [Link]
  • [SS] Shreyas Sundaram, "Fault-Tolerant and Secure Control Systems," Lecture Notes, 2012. [Link]
  • [HS] Henrik Sandberg, "EL2850 Lecture Notes," KTH, 2023. [Made available in Canvas] 

Software

With submitted solutions to the Homework Assignments, Python code (or MATLAB code) should be attached. The following Python packages are recommended:

To freely download these packages, the Anaconda distribution [link] is recommended.

Examination and completion

Grading scale

A, B, C, D, E, FX, F

Examination

  • INL1 - Assignment, 2.5 credits, Grading scale: P, F
  • INL2 - Assignment, 2.5 credits, Grading scale: P, F
  • TEN1 - Written exam, 2.5 credits, Grading scale: A, B, C, D, E, FX, F

Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.

The examiner may apply another examination format when re-examining individual students.

The section below is not retrieved from the course syllabus:

The course is divided into three modules. Each module is examined by an assignment (INL1-1,1-2,1-3), and one exam problem each. To pass the course, INL1, INL2 and TEN1 all need to be passed. The final grade is based on TEN1.

INL1 - Assignment, 2.5 credits

INL1 consists of Homework 1-1, 1-2, and 1-3. These are problems that should be solved by hand or in Python/MATLAB where requested, and should be submitted by the due date in Canvas.

To get a pass grade (P) on INL1, you need  to pass all of Homework 1-1, 1-2, and 1-3.

INL2 - Assignment, 2.5 credits

INL2 consists of writing a short essay and a presentation in class.

To get a pass grade (P) on INL2, both the essay and the presentation need to be approved.

TEN1 - Written exam, 2.5 credits

The exam will have five problems: one per module and two additional more advanced problem that may combine material from all modules. The written exam is solved individually.

The final exam will decide the final grade (which also requires pass grade on INL1 and INL2). There are five problems with max 10 points per problem.

Grade Fx: 21 points or more, and 5 points or more on two out of problems 1-3.

Grade E: 23 points or more, and 5 points or more on each of problems 1-3.

Grade D: 28 points or more, and 5 points or more on each of problems 1-3.

Grade C: 33 points or more, and 5 points or more on each of problems 1-3.

Grade B: 38 points or more, and 5 points or more on each of problems 1-3.

Grade A: 43 points or more, and 5 points or more on each of problems 1-3.

Grading criteria/assessment criteria

Formulate basic theory and definitions of important concepts in safety in cyber-physical systems in general and time-critical systems in particular. Apply model and data-based methods for safety in cyber-physical systems particularly for time-critical systems.

E: to solve basic problems

D: to solve advanced problems within some part of the course

C: to solve advanced problems within several parts of the course

B: to solve advanced problems with all parts of the course or to solve problems combining several parts of the course

A: to solve advanced problems within all parts of the course and to solve problems combining several parts of the course.

Opportunity to complete the requirements via supplementary examination

Students with Fx on the written exam should contact the examiner for an opportunity for supplementary examination to grade to E. 

Students with F on some assignements will be given the chance to resubmit again after the written exam if, and only if, the written exam is passed. The same chance is given after the re-exam.

Reporting of exam results

Assignments are submitted and corrected in Canvas.

The result on the written exam is reported directly via LADOK.

Ethical approach

  • All members of a group are responsible for the group's work.
  • In any assessment, every student shall honestly disclose any help received and sources used.
  • In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.

Further information

No information inserted

Round Facts

Start date

28 Aug 2023

Course offering

  • Autumn 2023-51295

Language Of Instruction

English

Offered By

EECS/Intelligent Systems

Contacts

Course Coordinator

Teachers

Teacher Assistants

Examiner