System for the recognition of code sabotage of a control system through trusted-memory processors
Data di pubblicazione
03-05-2022Codice
DEIB.21.068.AStato
DisponibileData di priorità
19-07-2021Fase
Italian Patent Application processTitolare
Politecnico di MilanoDipartimento
Department of Electronics, Information and BioengineeringAutori
Mara Tanelli, Stefano ZaneroDescrizione
The invention consists in a method for the recognition of anomalies of potential cyber-attacks in real-time control systems through trusted-memory processors. The aim of the invention is to check the output values of the controller and to ensure that they are in an acceptable range in order to confirm that the values were not sabotaged during the process.
Automation is a highly topical issue for years. A system, to work properly in an autonomous way, needs a control circuit, which allows to perform an action with the possibility of changing variables to fit the necessities in real-time.
Automation is a highly topical issue for years. A system, to work properly in an autonomous way, needs a control circuit, which allows to perform an action with the possibility of changing variables to fit the necessities in real-time.
- open-ring circuits, which require the intervention of the operator;
- closed-ring circuits, which can work autonomously thanks to their software-embedded architecture.
This last element is the target of the present invention: the software of the closed control circuit can be exposed to cyber attacks, which can lead to unproper or dangerous functioning of a machine, for example. The invention consists in a method for the recognition of anomalies of potential cyber-attacks in real-time control systems through trusted-memory processors.