메뉴 건너뛰기




Volumn 82, Issue 4, 2009, Pages 583-589

Discovering vulnerabilities in control system human-machine interface software

Author keywords

Authentication; Education; HMI; SCADA; Security

Indexed keywords

APPLICATIONS; AUTHENTICATION; COMPUTER SOFTWARE; CURRICULA; HUMAN COMPUTER INTERACTION; MAN MACHINE SYSTEMS; SCADA SYSTEMS; SCHOOL BUILDINGS; SECURITY SYSTEMS;

EID: 62849096292     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2008.12.049     Document Type: Article
Times cited : (15)

References (23)
  • 1
    • 2642511192 scopus 로고    scopus 로고
    • Wireshark network protocol analyzer
    • > Current July
    • Combs, G., 2008. Wireshark network protocol analyzer. (Current July 2008).
    • (2008)
    • Combs, G.1
  • 2
    • 62849126075 scopus 로고    scopus 로고
    • Critical Infrastructure Protection Center. (Current 2008).
    • Critical Infrastructure Protection Center. (Current 2008).
  • 3
    • 62849088269 scopus 로고    scopus 로고
    • CVE, CVE-2008-0176. Heap-based buffer overflow in GE Fanuc CIMPLICITY HMI, 2008. (Current July 2008).
    • CVE, CVE-2008-0176. Heap-based buffer overflow in GE Fanuc CIMPLICITY HMI, 2008. (Current July 2008).
  • 4
    • 62849126074 scopus 로고    scopus 로고
    • Department of Defense, 1983, 1985. Trusted Computer System Evaluation Criteria (Orange Book), DoD 5200.28-STD.
    • Department of Defense, 1983, 1985. Trusted Computer System Evaluation Criteria (Orange Book), DoD 5200.28-STD.
  • 5
    • 62849083859 scopus 로고    scopus 로고
    • GE Fanuc, 2008. Proficy HMI/SCADA - iFIX - iFIX Technical Benefits, 2005. (Current July 2008).
    • GE Fanuc, 2008. Proficy HMI/SCADA - iFIX - iFIX Technical Benefits, 2005. (Current July 2008).
  • 6
    • 62849110595 scopus 로고    scopus 로고
    • Homeland Security Presidential Directive 7, 2003. Critical Infrastructure Identification, Prioritization, and Protection White House, December 17, 2003. (Current July 2008).
    • Homeland Security Presidential Directive 7, 2003. Critical Infrastructure Identification, Prioritization, and Protection White House, December 17, 2003. (Current July 2008).
  • 7
    • 62849102639 scopus 로고    scopus 로고
    • Immunity Debugger
    • Immunity, Inc, immdbg.shtml>Current July
    • Immunity, Inc., 2008. Immunity Debugger. (Current July 2008).
    • (2008)
  • 8
    • 78649573044 scopus 로고    scopus 로고
    • Cyber Incident Blamed for Nuclear Power Plant Shutdown, Washington Post, June 5, 2008
    • 4a993y> Current July
    • Krebs, B., 2008. Cyber Incident Blamed for Nuclear Power Plant Shutdown, Washington Post, June 5, 2008. (Current July 2008).
    • (2008)
    • Krebs, B.1
  • 9
    • 62849088034 scopus 로고    scopus 로고
    • Hacking U3 Smart USB Drives
    • > Current July
    • McGrew, R., 2006. Hacking U3 Smart USB Drives. (Current July 2008).
    • (2006)
    • McGrew, R.1
  • 11
    • 62849111109 scopus 로고    scopus 로고
    • Saltzer, J., Schroeder, M., 1974. The Protection of Information in Computer Systems, Communications of the ACM 17, 7 (July 1974), web: (Current July 2008).
    • Saltzer, J., Schroeder, M., 1974. The Protection of Information in Computer Systems, Communications of the ACM 17, 7 (July 1974), web: (Current July 2008).
  • 12
    • 62849105339 scopus 로고    scopus 로고
    • United States Computer Emergency Readiness Team, VU#310355
    • United States Computer Emergency Readiness Team, VU#310355, 2008.
    • (2008)
  • 13
    • 62849115069 scopus 로고    scopus 로고
    • Software engineering and security engineering: An argument for merger, panel chair
    • New Orleans, LA, March 22-24
    • Vaughn, R., 1999. Software engineering and security engineering: an argument for merger, panel chair. In: 12th Conference on Software Engineering Education and Training (CSEE&T99) New Orleans, LA, March 22-24, 1999.
    • (1999) 12th Conference on Software Engineering Education and Training (CSEE&T99)
    • Vaughn, R.1
  • 14
    • 62849094502 scopus 로고    scopus 로고
    • Vaughn, R., 1999. Computer security training and emerging software engineering degree programs, panel chair and presentation. In: 22nd National Information Systems Security Conference, October 1999.
    • Vaughn, R., 1999. Computer security training and emerging software engineering degree programs, panel chair and presentation. In: 22nd National Information Systems Security Conference, October 1999.
  • 15
    • 62849093010 scopus 로고    scopus 로고
    • Software engineering degree programs, CROSSTALK
    • Vaughn R. Software engineering degree programs, CROSSTALK. The Journal of Defense Software Engineering 13 13 (2000) 7-9
    • (2000) The Journal of Defense Software Engineering , vol.13 , Issue.13 , pp. 7-9
    • Vaughn, R.1
  • 16
    • 0033905631 scopus 로고    scopus 로고
    • A report on industrial transfer of software engineering to the classroom environment
    • Austin TX, March 6-8
    • Vaughn, R., 2000. A report on industrial transfer of software engineering to the classroom environment. In: Thirteenth Conference on Software Engineering Education and Training, Austin TX, March 6-8, 2000.
    • (2000) Thirteenth Conference on Software Engineering Education and Training
    • Vaughn, R.1
  • 17
    • 0033705346 scopus 로고    scopus 로고
    • Application of security to the computing science classroom - lessons learned
    • Austin TX, March 8-12
    • Vaughn, R., 2000. Application of security to the computing science classroom - lessons learned. In: SIGCSE 2000 Technical Symposium, Austin TX, March 8-12, 2000.
    • (2000) SIGCSE 2000 Technical Symposium
    • Vaughn, R.1
  • 19
    • 0033319075 scopus 로고    scopus 로고
    • Integration of computer security into software engineering and computer science programs
    • Vaughn R., and Boggess E. Integration of computer security into software engineering and computer science programs. The Journal of Systems and Software 49 (1999) 149-153
    • (1999) The Journal of Systems and Software , vol.49 , pp. 149-153
    • Vaughn, R.1    Boggess, E.2
  • 20
    • 62849127617 scopus 로고    scopus 로고
    • Thoughts and experiences in provision of sufficient security - reflections on paths well traveled
    • Orlando, Florida, February 28-March 2
    • Vaughn, R., Henning, R., 2001. Thoughts and experiences in provision of sufficient security - reflections on paths well traveled. In: Second Annual International Systems Security Engineering Conference, Orlando, Florida, February 28-March 2, 2001, pp. 179-184.
    • (2001) Second Annual International Systems Security Engineering Conference , pp. 179-184
    • Vaughn, R.1    Henning, R.2
  • 21
    • 0036532101 scopus 로고    scopus 로고
    • An empirical study of industrial security engineering practices
    • Vaughn R., Henning R., and Fox K. An empirical study of industrial security engineering practices. Journal of Systems and Software 61 3 (2002) 225-232
    • (2002) Journal of Systems and Software , vol.61 , Issue.3 , pp. 225-232
    • Vaughn, R.1    Henning, R.2    Fox, K.3
  • 22
    • 0006291871 scopus 로고
    • Security Controls for Computer Systems (U)
    • Rand Report R609-1, The RAND Corporation, Santa Monica, CA
    • Ware, W., 1970. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security; Rand Report R609-1, The RAND Corporation, Santa Monica, CA.
    • (1970) Report of Defense Science Board Task Force on Computer Security
    • Ware, W.1
  • 23
    • 62849125060 scopus 로고    scopus 로고
    • Cyber security of substation control and diagnostic systems
    • Grigsby L.L. (Ed), CRC Press
    • Weiss J., and Delson M. Cyber security of substation control and diagnostic systems. In: Grigsby L.L. (Ed). Electric Power Engineering Handbook (2007), CRC Press
    • (2007) Electric Power Engineering Handbook
    • Weiss, J.1    Delson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.