메뉴 건너뛰기




Volumn 7, Issue 1, 2011, Pages 30-40

Formal vulnerability analysis of a security system for remote fieldbus access

Author keywords

Computer security; cryptographic protocols; formal specifications; formal verification; industrial control; supervisory control and data acquisition (SCADA) systems

Indexed keywords

COMPUTER SECURITY; CRYPTOGRAPHIC PROTOCOLS; FORMAL SPECIFICATIONS; FORMAL VERIFICATIONS; INDUSTRIAL CONTROL; SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS;

EID: 79951577827     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2010.2099233     Document Type: Article
Times cited : (34)

References (25)
  • 1
    • 0030714531 scopus 로고    scopus 로고
    • Network security considerations in TCP/IP-based manufacturing automation
    • PII S0019057897000062
    • M. S. DePriest, "Network security considerations in TCP/IP-based manufacturing automation," ISA Transactions, vol. 36, no. 1, pp. 37-48, 1997. (Pubitemid 127756622)
    • (1997) ISA Transactions , vol.36 , Issue.1 , pp. 37-48
    • Depriest, M.S.1
  • 3
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
    • V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," Comput. Security, vol. 25, no. 7, pp. 498-506, 2006. (Pubitemid 44637241)
    • (2006) Computers and Security , vol.25 , Issue.7 , pp. 498-506
    • Igure, V.M.1    Laughter, S.A.2    Williams, R.D.3
  • 4
    • 58849164843 scopus 로고    scopus 로고
    • Security for process control systems: An overview
    • M. Brändle and M. Naedele, "Security for process control systems: An overview," IEEE Security and Privacy, vol. 6, no. 6, pp. 24-29, 2008.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.6 , pp. 24-29
    • Brändle, M.1    Naedele, M.2
  • 5
    • 27644559364 scopus 로고    scopus 로고
    • Trends in process control systems security
    • DOI 10.1109/MSP.2005.136
    • A. Miller, "Trends in process control systems security," IEEE Security and Privacy, vol. 3, no. 5, pp. 57-60, 2005. (Pubitemid 41560446)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 57-60
    • Miller, A.1
  • 6
    • 34548017452 scopus 로고    scopus 로고
    • Cyber security risk assessment for SCADA and DCS networks
    • DOI 10.1016/j.isatra.2007.04.003, PII S0019057807000754
    • P. Ralston, J. Graham, and J. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Transactions, vol. 46, no. 4, pp. 583-594, 2007. (Pubitemid 47284077)
    • (2007) ISA Transactions , vol.46 , Issue.4 , pp. 583-594
    • Ralston, P.A.S.1    Graham, J.H.2    Hieb, J.L.3
  • 13
    • 0037056208 scopus 로고    scopus 로고
    • Achievement of secure Internet access to fieldbus systems
    • DOI 10.1016/S0141-9331(02)00044-3, PII S0141933102000443
    • T. Sauter and C. Schwaiger, "Achievement of secure Internet access to fieldbus systems," Microprocessors and Microsystems, vol. 26, no. 7, pp. 331-339, 2002. (Pubitemid 34862748)
    • (2002) Microprocessors and Microsystems , vol.26 , Issue.7 , pp. 331-339
    • Sauter, T.1    Schwaiger, C.2
  • 15
    • 36248990245 scopus 로고    scopus 로고
    • Formal modeling and analysis of the modbus protocol
    • B. Dutertre, "Formal modeling and analysis of the modbus protocol," Critical Infrastructure Protection, pp. 189-204, 2007.
    • (2007) Critical Infrastructure Protection , pp. 189-204
    • Dutertre, B.1
  • 18
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C.-C. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. 29, pp. 198-207, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , pp. 198-207
    • Dolev, D.1    Yao, A.C.-C.2
  • 19
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • N. A. Durgin, P. Lincoln, and J. C. Mitchell, "Multiset rewriting and the complexity of bounded security protocols," J. Comput. Security, vol. 12, no. 2, pp. 247-311, 2004.
    • (2004) J. Comput. Security , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.A.1    Lincoln, P.2    Mitchell, J.C.3
  • 22
    • 17744372555 scopus 로고    scopus 로고
    • Security measures for industrial fieldbus systems - State of the art and solutions for IP-based approaches
    • 2004 IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS 2004
    • A. Treytl, T. Sauter, and C. Schwaiger, "Security measures for industrial fieldbus systems-state of the art and solutions for IP-based approaches," in Int. Workshop on Factory Commun. Syst., 2004, pp. 201-209. (Pubitemid 40575220)
    • (2004) IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS , pp. 201-209
    • Treytl, A.1    Sauter, T.2    Schwaiger, C.3
  • 24
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • G. Lowe, "A hierarchy of authentication specifications," in Computer Security Foundations Workshop, 1997, pp. 31-43.
    • (1997) Computer Security Foundations Workshop , pp. 31-43
    • Lowe, G.1
  • 25
    • 24344493908 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • DOI 10.1016/j.scico.2005.02.002, PII S0167642305000420, Static Analysis Symposium 2003
    • M. Abadi and B. Blanchet, "Computer-assisted verification of a protocol for certified email," Sci. Comput. Program., vol. 58, no. 1-2, pp. 3-27, 2005. (Pubitemid 41261375)
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.