CoFacS -- Simulating a Complete Factory to Study the Security of Interconnected Production
- URL: http://arxiv.org/abs/2508.14526v1
- Date: Wed, 20 Aug 2025 08:36:55 GMT
- Title: CoFacS -- Simulating a Complete Factory to Study the Security of Interconnected Production
- Authors: Stefan Lenz, David Schachtschneider, Simon Jonas, Liam Tirpitz, Sandra Geisler, Martin Henze,
- Abstract summary: CoFacS is the first COmplete FACtory Simulation that replicates an entire production line and affords the integration of real-life industrial applications.<n>We show that CoFacS has a maximum deviation of 0.11% to the physical reference, which enables us to study the impact of physical attacks or network-based cyber-attacks.
- Score: 2.0766068042442174
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: While the digitization of industrial factories provides tremendous improvements for the production of goods, it also renders such systems vulnerable to serious cyber-attacks. To research, test, and validate security measures protecting industrial networks against such cyber-attacks, the security community relies on testbeds to simulate industrial systems, as utilizing live systems endangers costly components or even human life. However, existing testbeds focus on individual parts of typically complex production lines in industrial factories. Consequently, the impact of cyber-attacks on industrial networks as well as the effectiveness of countermeasures cannot be evaluated in an end-to-end manner. To address this issue and facilitate research on novel security mechanisms, we present CoFacS, the first COmplete FACtory Simulation that replicates an entire production line and affords the integration of real-life industrial applications. To showcase that CoFacS accurately captures real-world behavior, we validate it against a physical model factory widely used in security research. We show that CoFacS has a maximum deviation of 0.11% to the physical reference, which enables us to study the impact of physical attacks or network-based cyber-attacks. Moreover, we highlight how CoFacS enables security research through two cases studies surrounding attack detection and the resilience of 5G-based industrial communication against jamming.
Related papers
- Industrial Survey on Robustness Testing In Cyber Physical Systems [0.0]
This paper presents findings from an industrial survey conducted in Wallonia, covering a wide range of sectors.<n>It investigates robustness from how it is understood and applied in relationship with requirements engineering.<n>It identifies key challenges and gaps between industry practices and state-of-the-art methodologies.
arXiv Detail & Related papers (2026-03-04T20:30:39Z) - Secure Data Bridging in Industry 4.0: An OPC UA Aggregation Approach for Including Insecure Legacy Systems [0.4675863182439614]
The increased connectivity of industrial networks has led to a surge in cyberattacks.<n>Modern Industry 4.0 technologies, such as OPC UA, offer enhanced resilience against these threats.<n>Many systems do not yet implement these technologies, or only partially.<n>This paper reviews existing solutions to address this challenge by analysing their approaches, advantages, and limitations.
arXiv Detail & Related papers (2026-01-16T01:18:31Z) - Under Pressure: Security Analysis and Process Impacts of a Commercial Smart Air Compressor [0.0]
The integration of Industrial Internet of Things (IIoT) devices into manufacturing environments has accelerated the transition to Industry 4.0.<n>This paper conducts a comprehensive security analysis of a commercial smart air compressor, revealing critical vulnerabilities.
arXiv Detail & Related papers (2025-10-22T17:01:03Z) - CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment [45.86654759872101]
Cyber-physical systems (CPSs) have experienced a significant technological evolution and increased connectivity, at the cost of greater exposure to cyber-attacks.<n>We propose CyFence, a novel architecture that improves the resilience of closed-loop control systems against cyber-attacks by adding a semantic check.<n>We evaluate CyFence considering a real-world application, consisting of an active braking digital controller, demonstrating that it can mitigate different types of attacks with a negligible overhead.
arXiv Detail & Related papers (2025-06-12T12:22:45Z) - SafeAgent: Safeguarding LLM Agents via an Automated Risk Simulator [77.86600052899156]
Large Language Model (LLM)-based agents are increasingly deployed in real-world applications.<n>We propose AutoSafe, the first framework that systematically enhances agent safety through fully automated synthetic data generation.<n>We show that AutoSafe boosts safety scores by 45% on average and achieves a 28.91% improvement on real-world tasks.
arXiv Detail & Related papers (2025-05-23T10:56:06Z) - Poster: Towards an Automated Security Testing Framework for Industrial UEs [2.7082111912355877]
We report on our efforts to create an automated security testing framework for industrial UEs.<n>We aim to provide stakeholders with a fully automated-method to verify that higher-layer security protocols are correctly implemented.
arXiv Detail & Related papers (2025-05-22T06:54:38Z) - VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse [52.57251742991769]
vehicular Metaverse guard (VMGuard) protects vehicular Metaverse systems from data poisoning attacks.<n>VMGuard implements a reputation-based incentive mechanism to assess the trustworthiness of participating SIoT devices.<n>Our system ensures that reliable SIoT devices, previously missclassified, are not barred from participating in future rounds of the market.
arXiv Detail & Related papers (2024-12-05T17:08:20Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Defining and Evaluating Physical Safety for Large Language Models [62.4971588282174]
Large Language Models (LLMs) are increasingly used to control robotic systems such as drones.
Their risks of causing physical threats and harm in real-world applications remain unexplored.
We classify the physical safety risks of drones into four categories: (1) human-targeted threats, (2) object-targeted threats, (3) infrastructure attacks, and (4) regulatory violations.
arXiv Detail & Related papers (2024-11-04T17:41:25Z) - High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security [1.8434042562191815]
This research highlights the rapid development of technology in the industry, particularly Industry 4.0.
Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks.
This research proposes a solution by developing a hardware security module (HSM) using a field-programmable gate array (FPGA) with physical unclonable function (PUF) authentication and a hybrid encryption data security system.
arXiv Detail & Related papers (2024-09-16T02:06:49Z) - Interpretable Cyber Threat Detection for Enterprise Industrial Networks: A Computational Design Science Approach [1.935143126104097]
We use IS computational design science paradigm to develop a two-stage cyber threat detection system for enterprise-level IS.
The first stage generates synthetic industrial network data using a modified generative adversarial network.
The second stage develops a novel bidirectional gated recurrent unit and a modified attention mechanism for effective threat detection.
arXiv Detail & Related papers (2024-09-04T19:54:28Z) - Safe Inputs but Unsafe Output: Benchmarking Cross-modality Safety Alignment of Large Vision-Language Model [73.8765529028288]
We introduce a novel safety alignment challenge called Safe Inputs but Unsafe Output (SIUO) to evaluate cross-modality safety alignment.<n>To empirically investigate this problem, we developed the SIUO, a cross-modality benchmark encompassing 9 critical safety domains, such as self-harm, illegal activities, and privacy violations.<n>Our findings reveal substantial safety vulnerabilities in both closed- and open-source LVLMs, underscoring the inadequacy of current models to reliably interpret and respond to complex, real-world scenarios.
arXiv Detail & Related papers (2024-06-21T16:14:15Z) - Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices [4.252049820202961]
The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems.
We present a systematic and holistic procedure for analyzing the attack surface and threats of Industrial Internet of Things devices.
arXiv Detail & Related papers (2024-05-25T17:55:23Z) - Vulnerability Assessment of Industrial Control System with an Improved
CVSS [3.9596068699962323]
This study proposes a method to assess the risk of cyberattacks on ICS with an improved Common Vulnerability Scoring System (CVSS)
Results show the physical system levels of ICS have the highest severity once cyberattacked.
arXiv Detail & Related papers (2023-06-14T16:48:06Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.