What is it about?

We designed a Generative Model, with a customized loss function and training algorithm, to automatically generate cyber-attack scenarios for evaluating the vulnerability of complex control and infrastructure systems. Instead of relying on detailed physical models or pre-collected attack data, this data-driven generative model learns how to produce stealthy and effective attacks through interaction with physical systems.

Featured Image

Why is it important?

We provide a scalable, data-driven method to explore the full vulnerability space of cyber-physical systems—far beyond what traditional model-based or single-attack methods can capture. It gives defenders a way to automatically generate realistic, stealthy cyber-attacks, helping them understand and strengthen system vulnerabilities before adversaries exploit them. Additionally, it allows critical infrastructure operators to proactively test resilience using AI-generated attack scenarios that mimic real-world adversarial behavior.

Perspectives

Working on this paper was especially rewarding because it brought together ideas from control theory, machine learning, and cybersecurity in a seamless way. Seeing how a generative model can uncover vulnerabilities that even domain experts might overlook reinforced for me just how powerful data-driven methods can be in protecting critical infrastructure.

Yu Zheng
Florida State University

Read the Original

This page is a summary of: Generative Vulnerability Assessment for Cyber-Physical Systems, ACM Transactions on Cyber-Physical Systems, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3776543.
You can read the full text:

Read

Contributors

The following have contributed to this page