A
B
C
X
Y
Z
set of various adversarial examples
A, B, C: natural models
X, Y, Z: models with defense
小銀
小夜
\(k=g^{xy}\)
\(g,g^x\)
\(x\)
\(y\)
\(g^y\)
Token-Granting
Server
HMI
PLC
Employee /
Manager
Request access token
Grant access token with correct policy
Give order along with access token
update
check validity of token / whether action allowed
give order
1. request \(M\)
firewall
2. request \(M\) \(MAC=hash(M+K)\)
secret key \(K\)
3. forward & verify
4. response
5. forward & add MAC
3.5 error report if verification fail
6. response \(R\) \(MAC = hash(R + K)\)
6.5 error report if verification fail
By Howard Yang