A

B

C

X

Y

Z

set of various adversarial examples

A, B, C: natural models

X, Y, Z: models with defense

小銀

小夜

\(k=g^{xy}\)

\(g,g^x\)

\(x\)

\(k=g^{xy}\)

\(y\)

\(g^y\)

Token-Granting

Server

HMI

PLC

Employee /

Manager

Request access token

Grant access token with correct policy

Give order along with access token

update

check validity of token / whether action allowed

give order

HMI

PLC

1. request \(M\)

firewall

2. request \(M\)
\(MAC=hash(M+K)\)

secret key \(K\)

secret key \(K\)

3.  forward
& verify

4. response

5. forward
& add MAC

3.5 error report
if verification fail

6. response \(R\)
\(MAC = hash(R + K)\)

6.5 error report
if verification fail

drawings

By Howard Yang

drawings

  • 36