메뉴 건너뛰기




Volumn 253, Issue , 2007, Pages 205-221

Security analysis of multilayer SCADA protocols: A Modbus TCP case study

Author keywords

Formal methods; Modbus TCP; Multilayer protocols; Security analysis

Indexed keywords


EID: 36248966550     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-75462-8_15     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 1
    • 23144463868 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM, vol. 52(1), pp. 102-146, 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.1 , pp. 102-146
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 19144369108 scopus 로고
    • Programming Satan's computer
    • Computer Science Today: Recent Trends and Developments (, J. van Leeuwen Ed, Springer-Verlag, Berlin, Germany, pp
    • R. Anderson and R. Needham, Programming Satan's computer, in Computer Science Today: Recent Trends and Developments (LNCS Vol. 1000), J. van Leeuwen (Ed.), Springer-Verlag, Berlin, Germany, pp. 426-440, 1995.
    • (1995) LNCS , vol.1000 , pp. 426-440
    • Anderson, R.1    Needham, R.2
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol. 29(2), pp. 198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 8
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
    • S. Escobar, C. Meadows and J. Meseguer, A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science, vol. 367(1-2), pp. 162-202, 2006.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 162-202
    • Escobar, S.1    Meadows, C.2    Meseguer, J.3
  • 11
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol. 6, pp. 53-84, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 17
    • 84904304256 scopus 로고    scopus 로고
    • Integrating logics and process calculi for cryptographic protocol analysis
    • D. Gritzalis, S. De Capitani di Vimercati, P. Samarati and S. Katsikas Eds, Kluwer, Boston, pp
    • M. Papa, O. Bremer, J. Hale and S. Shenoi, Integrating logics and process calculi for cryptographic protocol analysis, in Security and Privacy in the Age of Uncertainty, D. Gritzalis, S. De Capitani di Vimercati, P. Samarati and S. Katsikas (Eds.), Kluwer, Boston, pp. 349-360, 2003.
    • (2003) Security and Privacy in the Age of Uncertainty , pp. 349-360
    • Papa, M.1    Bremer, O.2    Hale, J.3    Shenoi, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.