메뉴 건너뛰기




Volumn , Issue , 2011, Pages 4490-4494

Stuxnet worm impact on industrial cyber-physical system security

Author keywords

[No Author keywords available]

Indexed keywords

CYBER-PHYSICAL SYSTEMS; INDUSTRIAL SYSTEMS; MONITORING AND CONTROL SYSTEMS; OPERATING ENVIRONMENT; POTENTIAL THREATS; SECURITY CONSIDERATIONS; SENSE OF SECURITY; TECHNOLOGICAL CAPABILITY; WORM ATTACK;

EID: 84856512439     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IECON.2011.6120048     Document Type: Conference Paper
Times cited : (431)

References (29)
  • 3
    • 79953895474 scopus 로고    scopus 로고
    • Lessons from stuxnet
    • T. Chen and S. Abu-Nimeh, "Lessons from stuxnet," Computer, vol. 44, no. 4, pp. 91-93, 2011.
    • (2011) Computer , vol.44 , Issue.4 , pp. 91-93
    • Chen, T.1    Abu-Nimeh, S.2
  • 4
    • 84856546754 scopus 로고    scopus 로고
    • [Online]
    • "Stuxnet." [Online]. Available: https://secure.wikimedia.org/ wikipedia/ en/wiki/Stuxnet#cite note-5
    • Stuxnet
  • 5
    • 84856558583 scopus 로고    scopus 로고
    • Architecting the next generation of service-based SCADA/DCS system of systems
    • Melbourne, Australia., 7-10 Nov 2011. [Online]
    • S. Karnouskos and A. W. Colombo, "Architecting the next generation of service-based SCADA/DCS system of systems," in 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), Melbourne, Australia., 7-10 Nov 2011. [Online]. Available: http://sites.google.com/site/karnouskos/ files/2011IECONngSCADA.pdf
    • 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011)
    • Karnouskos, S.1    Colombo, A.W.2
  • 6
    • 78650062267 scopus 로고    scopus 로고
    • Symantec, Tech. Rep., Feb. [Online]
    • N. Falliere, L. O. Murchu, and E. Chien, "W32.stuxnet dossier," Symantec, Tech. Rep., Feb. 2011. [Online]. Available: http://www.symantec.com/ content/en/us/enterprise/media/security response/whitepapers/w32 stuxnet dossier.pdf
    • (2011) W32.stuxnet Dossier
    • Falliere, N.1    Murchu, L.O.2    Chien, E.3
  • 8
    • 84856513428 scopus 로고    scopus 로고
    • Exploiting siemens simatic S7 PLCs
    • Las Vegas, NV, USA, 3-4 Aug [Online]
    • D. Beresford, "Exploiting Siemens Simatic S7 PLCs," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat.com/bh-us-11/Beresford/BHUS11BeresfordS7PLCsWP.pdf
    • (2011) Black Hat USA+2011
    • Beresford, D.1
  • 9
    • 79951858522 scopus 로고    scopus 로고
    • Compromise through usb-based hardware Trojan horse device
    • May. [Online]
    • J. Clark, S. Leblanc, and S. Knight, "Compromise through usb-based hardware trojan horse device," Future Gener. Comput. Syst., vol. 27, pp. 555-563, May 2011. [Online]. Available: http://dx.doi.org/10.1016/j.future.2010. 04.008
    • (2011) Future Gener. Comput. Syst. , vol.27 , pp. 555-563
    • Clark, J.1    Leblanc, S.2    Knight, S.3
  • 10
    • 84856549738 scopus 로고    scopus 로고
    • USB - Undermining security barriers
    • Las Vegas, NV, USA, 3-4 Aug [Online]
    • A. Davis, "USB - undermining security barriers," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat.com/bh-us-11/Davis/BHUS11-DavisUSBWP.pdf
    • (2011) Black Hat USA+2011
    • Davis, A.1
  • 11
    • 78651389795 scopus 로고    scopus 로고
    • Can you still trust your network card?
    • Vancouver, Canada, 22-26 Mar. [Online]
    • L. Duflot, Y.-A. Perez, G. Valadon, and O. Levillain, "Can you still trust your network card?" CanSecWest 2010, Vancouver, Canada, 22-26 Mar. 2010. [Online]. Available: http://www.ssi.gouv.fr/IMG/pdf/ csw-trustnetworkcard. pdf
    • (2010) CanSecWest 2010
    • Duflot, L.1    Perez, Y.-A.2    Valadon, G.3    Levillain, O.4
  • 12
    • 84910621255 scopus 로고    scopus 로고
    • Battery firmware hacking
    • Las Vegas, NV, USA, 3-4 Aug [Online]
    • C. Miller, "Battery firmware hacking," in Black Hat USA+2011, Las Vegas, NV, USA, 3-4 Aug. 2011. [Online]. Available: https://media.blackhat. com/bh-us-11/Miller/BHUS11MillerBatteryFirmwarePublicWP.pdf
    • (2011) Black Hat USA+2011
    • Miller, C.1
  • 13
    • 72849124307 scopus 로고    scopus 로고
    • Hardware Trojan horse device based on unintended usb channels
    • ser. NSS '09. Washington, DC, USA, IEEE Computer Society, [Online]
    • J. Clark, S. Leblanc, and S. Knight, "Hardware trojan horse device based on unintended usb channels," in Proceedings of the 2009 Third International Conference on Network and System Security, ser. NSS '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 1-8. [Online]. Available: http://dx.doi.org/10.1109/NSS.2009.48
    • (2009) Proceedings of the 2009 Third International Conference on Network and System Security , pp. 1-8
    • Clark, J.1    Leblanc, S.2    Knight, S.3
  • 19
    • 79952527986 scopus 로고    scopus 로고
    • On scada control system command and response injection and intrusion detection
    • oct. 2010
    • W. Gao, T. Morris, B. Reaves, and D. Richey, "On scada control system command and response injection and intrusion detection," in eCrime Researchers Summit (eCrime), 2010, oct. 2010, pp. 1 -9.
    • (2010) ECrime Researchers Summit (ECrime) , pp. 1-9
    • Gao, W.1    Morris, T.2    Reaves, B.3    Richey, D.4
  • 21
    • 75949097173 scopus 로고    scopus 로고
    • Towards new web services based supervisory systems in complex industrial organizations: Basic principles and case study
    • April
    • D. Idoughi, M. Kerkar, and C. Kolski, "Towards new web services based supervisory systems in complex industrial organizations: Basic principles and case study," Comput. Ind., vol. 61, pp. 235-249, April 2010.
    • (2010) Comput. Ind. , vol.61 , pp. 235-249
    • Idoughi, D.1    Kerkar, M.2    Kolski, C.3
  • 22
    • 78651077255 scopus 로고    scopus 로고
    • Study on the future internet system through analysis of scada systems
    • J. Song, S. Jung, and S. Kim, "Study on the future internet system through analysis of scada systems," Communication and Networking, pp. 10-14, 2010.
    • (2010) Communication and Networking , pp. 10-14
    • Song, J.1    Jung, S.2    Kim, S.3
  • 27
    • 80955155205 scopus 로고    scopus 로고
    • Aug. [Online]
    • D. Alperovitch, "Revealed: Operation Shady RAT," McAfee Labs, Tech. Rep., Aug. 2011. [Online]. Available: http://www.mcafee.com/us/resources/ white-papers/wp-operation-shady-rat.pdf
    • (2011) Revealed: Operation Shady RAT
    • Alperovitch, D.1
  • 28
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.1    Rohozinski, R.2
  • 29
    • 84946841683 scopus 로고    scopus 로고
    • U.S. Department of Commerce, Tech. Rep. NIST Special Publication 800-82, Jun. [Online]
    • K. Stouffer, J. Falco, and K. Scarfone, "Guide to industrial control systems (ics) security," National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Tech. Rep. NIST Special Publication 800-82, Jun. 2011. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800- 82/SP800-82-final.pdf
    • (2011) Guide to Industrial Control Systems (Ics) Security
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.