A
B
C
X
Y
Z
set of various adversarial examples
A, B, C: natural models
X, Y, Z: models with defense
小銀
小夜
\(k=g^{xy}\)
\(g,g^x\)
\(x\)
\(k=g^{xy}\)
\(y\)
\(g^y\)
Token-Granting
Server
HMI
PLC
Employee /
Manager
Request access token
Grant access token with correct policy
Give order along with access token
update
check validity of token / whether action allowed
give order
HMI
PLC
1. request \(M\)
firewall
2. request \(M\)
\(MAC=hash(M+K)\)
secret key \(K\)
secret key \(K\)
3. forward
& verify
4. response
5. forward
& add MAC
3.5 error report
if verification fail
6. response \(R\)
\(MAC = hash(R + K)\)
6.5 error report
if verification fail