메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 285-299

A product machine model for anomaly detection of interposition attacks on cyber-physical systems

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; CONTROL SYSTEMS; CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; INTRUSION DETECTION;

EID: 48249143566     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_19     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 2
    • 48249101680 scopus 로고    scopus 로고
    • ARM Limited, Cited 14 Jan 2008
    • ARM Limited, ARM Technical Reference Manuals. http://www.arm.com/ documentation/ARMProcessor_Cores/Cited 14 Jan 2008
    • ARM Technical Reference Manuals
  • 3
    • 48249129248 scopus 로고    scopus 로고
    • Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
    • United States Military Academy,West Point, New York, USA, pp
    • Bellettini C, Rrushi JL (2007) Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness. In: Proceedings of the 8th IEEE SMC Information Assurance Workshop, United States Military Academy,West Point, New York, USA, pp. 341-348
    • (2007) Proceedings of the 8th IEEE SMC Information Assurance Workshop , pp. 341-348
    • Bellettini, C.1    Rrushi, J.L.2
  • 5
    • 0003344417 scopus 로고    scopus 로고
    • Partial commutation and traces, Handbook on Formal Languages
    • Diekert V, Mètivier Y (1997) Partial commutation and traces, Handbook on Formal Languages, 3rd volume, Springer: 457-533
    • (1997) 3rd volume, Springer , pp. 457-533
    • Diekert, V.1    Mètivier, Y.2
  • 7
    • 14844297052 scopus 로고    scopus 로고
    • Gray-box extraction of execution graphs for anomaly detection
    • Gao D, Reiter MK, Song D (2004) Gray-box extraction of execution graphs for anomaly detection. In: ACM CCS
    • (2004) ACM CCS
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 8
    • 48249136707 scopus 로고    scopus 로고
    • iDefense (2007) Livedata protocol server heap overflow vulnerability. http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 Cited 14 Jan 2008
    • iDefense (2007) Livedata protocol server heap overflow vulnerability. http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 Cited 14 Jan 2008
  • 9
    • 26844434148 scopus 로고    scopus 로고
    • Structural properties of shuffle automata
    • Jedrzejowicz J (1999) Structural properties of shuffle automata. In: Grammars 2, number 1, 1999.
    • (1999) Grammars , vol.2 , Issue.1
    • Jedrzejowicz, J.1
  • 12
    • 69249215749 scopus 로고    scopus 로고
    • Modbus Organization , Cited 14 Jan 2008
    • Modbus Organization (2004) MODBUS Application Protocol Specification V 1.1a. http://www.modbus.org/docs/Modbus_Application_protocol_V1_1a.pdf Cited 14 Jan 2008
    • (2004) MODBUS Application Protocol Specification V 1.1a
  • 15
    • 48249125553 scopus 로고    scopus 로고
    • Parampalli C, Sekar R, Johnson R (2007) A Practical Mimicry Attack Against Powerful System-Call Monitors. Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University, USA
    • Parampalli C, Sekar R, Johnson R (2007) A Practical Mimicry Attack Against Powerful System-Call Monitors. Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University, USA
  • 19
    • 48249125127 scopus 로고    scopus 로고
    • US-CERT (2006) LiveData ICCP Server heap buffer overflow vulnerability. Vulnerability note VU#190617
    • US-CERT (2006) LiveData ICCP Server heap buffer overflow vulnerability. Vulnerability note VU#190617
  • 20
    • 48249139964 scopus 로고    scopus 로고
    • US-CERT (2007) Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles. Vulnerability note VU#926551
    • US-CERT (2007) Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles. Vulnerability note VU#926551


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.