Attack | Method | Knowledge about the system? | How the knowledge is obtained? |
---|---|---|---|
Stuxnet worm [16] | Modifications in the | Yes | Experiments in a real system |
Long, et al. [18] | Jitter and packet loss | None | N/A |
Farooqui, et al. [4] | Data injection | None | N/A |
Data injection | Yes | Not described | |
Teixeira [20] | Packet loss | None | N/A |
Data injection | Yes | Not described | |
Amin [6] | Data injection | Yes | Not described |
SD-Controlled [12] | Data injection | Yes | Passive system identification attack |
de Sá, et al. [17] | Data injection a | Yes | Active system identification attack |