What is it about?

This paper provides a comprehensive review of current approaches to security modelling in cyber-physical systems. It not only summarises the latest developments in the field, but also introduces a unified framework specifically designed to address the evolving threat landscape and diverse attacker techniques that cyber-physical systems face. By bridging theory with real-world scenarios, the work aims to help researchers and practitioners more effectively analyse vulnerabilities and risks in systems where digital and physical components interact.

Featured Image

Why is it important?

Cyber-physical systems increasingly underpin critical infrastructure worldwide, making their security a top priority. With the rapid evolution and growing sophistication of cyber threats, there is an urgent need to adapt security modelling methods that can protect these systems not just at the design stage, but throughout their operational life. This work provides a timely review that addresses these challenges, helping researchers and practitioners anticipate and manage new risks in an environment where attacks are increasingly frequent, complex, and can have far-reaching real-world consequences.

Perspectives

As a Chief Information Security Officer (CISO) deeply engaged in both academic and professional cybersecurity, I believe this paper offers practical guidance for anyone seeking to strengthen cyber-physical system security. In resource-constrained environments, effective security modelling can help decision-makers allocate budgets and technical capacities where they matter most. My hope is that this review not only supports risk mitigation for security practitioners, but also inspires further innovation and collaboration between academia and industry to keep pace with emerging threats.

Shaofei Huang
Singapore Management University

Read the Original

This page is a summary of: Security Modelling for Cyber-Physical Systems: A Systematic Literature Review, ACM Transactions on Cyber-Physical Systems, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3776549.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page