Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...