-
2
-
-
84870367589
-
-
Digital Bond Press, Sunrise, Florida
-
Goodspeed T., Highfill D., Singletary B. Low-level design vulnerabilities in wireless control systems hardware, in: Proceedings of the SCADA Security Scientific Symposium 2009, Digital Bond Press, Sunrise, Florida.
-
(2009)
Low-level design vulnerabilities in wireless control systems hardware, in: Proceedings of the SCADA Security Scientific Symposium
-
-
Goodspeed, T.1
Highfill, D.2
Singletary, B.3
-
3
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Springer-Verlag, London, S. Vaudenay, A. Youssef (Eds.)
-
Fluhrer S., Mantin I., Shamir A. Weaknesses in the key scheduling algorithm of RC4. Revised Papers from the Eighth Annual International Workshop on Selected Areas in Cryptography 2001, 1-24. Springer-Verlag, London. S. Vaudenay, A. Youssef (Eds.).
-
(2001)
Revised Papers from the Eighth Annual International Workshop on Selected Areas in Cryptography
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
4
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
E. Tews, R. Weinmann, A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds, in: Proceedings of the Eighth International Conference on Information Security Applications, 2007, pp. 188-202.
-
(2007)
Proceedings of the Eighth International Conference on Information Security Applications
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.2
Pyshkin, A.3
-
6
-
-
78650757225
-
An improved attack on TKIP
-
F. Halvorsen, O. Haugen, M. Eian, S. Mjolsnes, An improved attack on TKIP, in: Proceedings of the Fourteenth Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age, 2009, pp. 120-132.
-
(2009)
Proceedings of the Fourteenth Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
, pp. 120-132
-
-
Halvorsen, F.1
Haugen, O.2
Eian, M.3
Mjolsnes, S.4
-
7
-
-
84871174221
-
-
A practical message falsification attack on WPA, Presented at the Joint Workshop on Information Security, 〈〉
-
T. Ohigashi, M. Morii, A practical message falsification attack on WPA, Presented at the Joint Workshop on Information Security, 2009 〈〉. http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf.
-
(2009)
-
-
Ohigashi, T.1
Morii, M.2
-
8
-
-
84871143058
-
-
802.11 Attacks, Version 1.0, White Paper, Foundstone Professional Services, McAfee, Santa Clara, California, 〈〉
-
B. Antoniewicz, 802.11 Attacks, Version 1.0, White Paper, Foundstone Professional Services, McAfee, Santa Clara, California, 〈〉. http://www.mcafee.com/us/resources/white-papers/foundstone/wp-80211-attacks.pdf.
-
-
-
Antoniewicz, B.1
-
9
-
-
33645849314
-
-
Wi-Fi Net News 〈〉, (accessed 4.11.03).
-
R. Moskowitz, Weakness in passphrase choice in WPA interface, Wi-Fi Net News 〈〉, 2003 (accessed 4.11.03). http://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_in_wpa_interface.html.
-
(2003)
Weakness in passphrase choice in WPA interface
-
-
Moskowitz, R.1
-
10
-
-
84871174984
-
-
WPA too! Presented at DEF CON 18, 〈〉
-
M. Ahmad, WPA too! Presented at DEF CON 18, 2010 〈〉. http://www.defcon.org/images/defcon-18/dc-18-presentations/Ahmad/DEFCON-18-Ahmad-WPA-Too-WP.pdf.
-
(2010)
-
-
Ahmad, M.1
-
11
-
-
77956604585
-
Who is peeping at your passwords at Starbucks? To catch an evil twin access point
-
Y. Song, C. Yang, G. Gu, Who is peeping at your passwords at Starbucks? To catch an evil twin access point, in: Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2010, pp. 323-332.
-
(2010)
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 323-332
-
-
Song, Y.1
Yang, C.2
Gu, G.3
-
12
-
-
84871140261
-
-
Rogue AP 101 - Threat, detection and defense, Presented at the Black Hat Federal Conference, 〈〉
-
Beetle, B. Potter, Rogue AP 101 - Threat, detection and defense, Presented at the Black Hat Federal Conference, 2003 〈〉. http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-beetle/bh-fed-03-beetle-up.pdf.
-
(2003)
-
-
Potter, B.B.1
-
13
-
-
84871167947
-
-
PEAP: Pwned extensible authentication protocol, Presented at ShmooCon 2008 〈〉
-
J. Wright, B. Antoniewicz, PEAP: Pwned extensible authentication protocol, Presented at ShmooCon 2008, 2008 〈〉. http://www.willhackforsushi.com/presentations/PEAP_Shmoocon2008_Wright_Antoniewicz.pdf.
-
(2008)
-
-
Wright, J.1
Antoniewicz, B.2
-
14
-
-
84871145245
-
-
Asleap, Will Hack for SUSHI, 〈〉
-
J. Wright, Asleap, Will Hack for SUSHI, 2008 〈〉. http://www.willhackforsushi.com/?page_id=41.
-
(2008)
-
-
Wright, J.1
-
15
-
-
84871147433
-
-
eapmd5pass, Will Hack for SUSHI, 〈〉
-
J. Wright, eapmd5pass, Will Hack for SUSHI, 2008 〈〉. http://www.willhackforsushi.com/?page_id=67.
-
(2008)
-
-
Wright, J.1
-
16
-
-
57549113108
-
On the performance of IEEE 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, B. Thapa, On the performance of IEEE 802.11 under jamming, in: Proceedings of the Twenty-Seventh IEEE Conference on Computer Communications, 2008, pp. 1265-1273.
-
(2008)
Proceedings of the Twenty-Seventh IEEE Conference on Computer Communications
, pp. 1265-1273
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
18
-
-
84871112511
-
-
U.S. Computer Emergency Readiness Team, IEEE 802.11 wireless network protocol DSSS CCA algorithm vulnerable to denial of service, Vulnerability Note VU#106678, Department of Homeland Security, Washington, DC, 〈〉
-
U.S. Computer Emergency Readiness Team, IEEE 802.11 wireless network protocol DSSS CCA algorithm vulnerable to denial of service, Vulnerability Note VU#106678, Department of Homeland Security, Washington, DC, 2004 〈〉. http://www.kb.cert.org/vuls/id/106678.
-
(2004)
-
-
-
20
-
-
82155180812
-
Jamming and interference induced denial of service attacks on IEEE 802.15.4 based wireless networks
-
Digital Bond Press, Sunrise, Florida
-
J. Brodsky, A. McConnell, Jamming and interference induced denial of service attacks on IEEE 802.15.4 based wireless networks, in: Proceedings of the SCADA Security Scientific Symposium, Digital Bond Press, Sunrise, Florida, 2009.
-
(2009)
Proceedings of the SCADA Security Scientific Symposium
-
-
Brodsky, J.1
McConnell, A.2
-
21
-
-
84870378092
-
-
Presented at ShmooCon 2011
-
R. Speers, R. Melgares, ZigBee security: find, fix, finish, Presented at ShmooCon 2011, 2011.
-
(2011)
ZigBee security: find, fix, finish
-
-
Speers, R.1
Melgares, R.2
-
22
-
-
51249117686
-
WirelessHART: applying wireless technology in real-time industrial process control
-
J. Song, S. Han, A. Mok, D. Chen, M. Lucas, M. Nixon, W. Pratt, WirelessHART: applying wireless technology in real-time industrial process control, in: Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2008, pp. 377-386.
-
(2008)
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium
, pp. 377-386
-
-
Song, J.1
Han, S.2
Mok, A.3
Chen, D.4
Lucas, M.5
Nixon, M.6
Pratt, W.7
-
23
-
-
84870367580
-
-
Technical Report 3799, Swedish Institute of Computer Science, Kista, Sweden
-
S. Raza, Secure Communication in WirelessHART and its Integration with Legacy HART, Technical Report 3799, Swedish Institute of Computer Science, Kista, Sweden, 2010.
-
(2010)
Secure Communication in WirelessHART and its Integration with Legacy HART
-
-
Raza, S.1
-
24
-
-
77949891992
-
Security considerations for the WirelessHART protocol
-
S. Raza, A. Slabbert, T. Voigt, K. Landernas, Security considerations for the WirelessHART protocol, in: Proceedings of the Fourteenth IEEE International Conference on Emerging Technologies and Factory Automation, 2009, pp. 242-249.
-
(2009)
Proceedings of the Fourteenth IEEE International Conference on Emerging Technologies and Factory Automation
, pp. 242-249
-
-
Raza, S.1
Slabbert, A.2
Voigt, T.3
Landernas, K.4
-
25
-
-
84871132282
-
-
Daintree Networks, Getting Started with ZigBee and IEEE 802.15.4, Mountain View, California, 〈〉
-
Daintree Networks, Getting Started with ZigBee and IEEE 802.15.4, Mountain View, California, 2008 〈〉. http://www.daintree.net/downloads/whitepapers/zigbee_primer.pdf.
-
(2008)
-
-
-
26
-
-
84870367577
-
-
ZigBee Alliance, ZigBee Specification, Zigbee Alliance Standard 053 474r17, San Ramon, California
-
ZigBee Alliance, ZigBee Specification, Zigbee Alliance Standard 053 474r17, San Ramon, California, 2008.
-
(2008)
-
-
-
29
-
-
65249164328
-
-
Presented at the INESC Seminario da Rede Tematica de Comunicacoes Moveis, 〈〉
-
R. Silva, S. Nunes, Security issues on Zigbee, Presented at the INESC Seminario da Rede Tematica de Comunicacoes Moveis, 2005 〈〉. http://telecom.inescporto.pt/fileadmin/rtcm/WorkShop_22_Jul_05/s2_Security_Issues_on_ZigBee.pdf.
-
(2005)
Security issues on Zigbee
-
-
Silva, R.1
Nunes, S.2
-
30
-
-
77954318750
-
-
Technical Report, Lawrence Livermore National Laboratory, Livermore, California
-
K. Masica, Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments (DRAFT), Technical Report, Lawrence Livermore National Laboratory, Livermore, California, 2007.
-
(2007)
Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments (DRAFT)
-
-
Masica, K.1
-
31
-
-
72449158666
-
Discovery, infiltration, and denial of service in a process control system wireless network
-
B. Reaves, T. Morris, Discovery, infiltration, and denial of service in a process control system wireless network, in: Proceedings of the eCrime Researchers Summit, 2009.
-
(2009)
Proceedings of the eCrime Researchers Summit
-
-
Reaves, B.1
Morris, T.2
-
32
-
-
84871176244
-
-
connectBlue, Malmo, Sweden, 〈〉
-
M. Andersson, Wireless technologies for industrial applications, connectBlue, Malmo, Sweden, 2001 〈〉. http://www.connectblue.com/fileadmin/Connectblue/Web2006/Documents/White_papers/Industrial_Bluetooth.pdf.
-
(2001)
Wireless technologies for industrial applications
-
-
Andersson, M.1
-
33
-
-
84870365361
-
-
Evaluation of the Current State of Bluetooth Security, Licentiate Thesis, University of Kuopio, Kuopio, Finland
-
K. Haataja, Evaluation of the Current State of Bluetooth Security, Licentiate Thesis, Department of Computer Science, University of Kuopio, Kuopio, Finland, 2007.
-
(2007)
Department of Computer Science
-
-
Haataja, K.1
-
34
-
-
84871116065
-
-
Bluetooth hacking revisited, Presented at the Twenty-Third Chaos Communication Congress, 〈〉
-
K. Finistere, T. Zoller, Bluetooth hacking revisited, Presented at the Twenty-Third Chaos Communication Congress, 2006 〈〉. http://www.nruns.com/_downloads/23C3-Berlin-Bluetooth-Hacking-Revisited-Thierry-Zoller.pdf.
-
(2006)
-
-
Finistere, K.1
Zoller, T.2
-
35
-
-
84871139754
-
-
Trifinite Group, Long distance snarfing, 〈〉
-
Trifinite Group, Long distance snarfing, 2006 〈〉. http://trifinite.org/trifinite_stuff_lds.html.
-
(2006)
-
-
-
37
-
-
84871165805
-
-
n.runs, BTCrack - bluetooth PIN cracker 〈〉.
-
n.runs, BTCrack - bluetooth PIN cracker 〈〉. http://secdev.zoller.lu/btcrack.zip.
-
-
-
-
40
-
-
84871134190
-
-
MaxStream, MaxStream extends ZigBee range up to 40 miles, Digi International, Minnetonka, Minnesota 〈〉, (accessed 25.10.06)
-
MaxStream, MaxStream extends ZigBee range up to 40 miles, Digi International, Minnetonka, Minnesota 〈〉, 2006 (accessed 25.10.06). http://www.digi.com/news/pressrelease?prid=275.
-
(2006)
-
-
-
41
-
-
62849096292
-
Discovering vulnerabilities in control system human-machine interface software
-
McGrew R., Vaughn R. Discovering vulnerabilities in control system human-machine interface software. Journal of Systems and Software 2009, 82(4):583-589.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.4
, pp. 583-589
-
-
McGrew, R.1
Vaughn, R.2
-
43
-
-
78650062267
-
-
Mountain View, California, 〈〉
-
N. Falliere, L. O'Murchu, E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011 〈〉. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf.
-
(2011)
W32.Stuxnet Dossier, Version 1.4, Symantec
-
-
Falliere, N.1
O'Murchu, L.2
Chien, E.3
-
44
-
-
84902345608
-
Lessons learned from the Maroochy water breach
-
Springer, Boston, Massachusetts, E. Goetz, S. Shenoi (Eds.)
-
Slay J., Miller M. Lessons learned from the Maroochy water breach. Critical Infrastructure Protection 2008, 73-82. Springer, Boston, Massachusetts. E. Goetz, S. Shenoi (Eds.).
-
(2008)
Critical Infrastructure Protection
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
45
-
-
84862862122
-
Cybersecurity testing of substation phasor measurement units and phasor data concentrators
-
article no. 24
-
T. Morris, S. Pan, J. Lewis, J. Moorhead, N. Younan, R. King, M. Freund, V. Madani, Cybersecurity testing of substation phasor measurement units and phasor data concentrators, in: Proceedings of the Seventh Annual ACM Cyber Security and Information Intelligence Research Workshop, article no. 24, 2011.
-
(2011)
Proceedings of the Seventh Annual ACM Cyber Security and Information Intelligence Research Workshop
-
-
Morris, T.1
Pan, S.2
Lewis, J.3
Moorhead, J.4
Younan, N.5
King, R.6
Freund, M.7
Madani, V.8
-
46
-
-
77952043216
-
-
Presented at DEF CON 16, 〈〉
-
M. Bristow, ModScan: a SCADA Modbus network scanner, Presented at DEF CON 16, 2008 〈〉. http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-bristow.pdf.
-
(2008)
ModScan: a SCADA Modbus network scanner
-
-
Bristow, M.1
-
47
-
-
84857971054
-
A retrofit network intrusion detection system for Modbus RTU and ASCII industrial control systems
-
T. Morris, R. Vaughn, Y. Dandass, A retrofit network intrusion detection system for Modbus RTU and ASCII industrial control systems, in: Proceedings of the Forty-Fifth IEEE Hawaii International Conference on System Sciences, 2012, pp. 2338-2345.
-
(2012)
Proceedings of the Forty-Fifth IEEE Hawaii International Conference on System Sciences
, pp. 2338-2345
-
-
Morris, T.1
Vaughn, R.2
Dandass, Y.3
-
49
-
-
79960432406
-
Hacking techniques in wireless networks
-
Wiley, Chichester
-
Mateti P. Hacking techniques in wireless networks. The Handbook of Information Security 2005, vol. III:83-93. Wiley, Chichester.
-
(2005)
The Handbook of Information Security
, vol.3
, pp. 83-93
-
-
Mateti, P.1
-
51
-
-
84891808534
-
Design and implementation of a secure Modbus protocol
-
Springer, Heidelberg, C. Palmer, S. Shenoi (Eds.)
-
Fovino I., Carcano A., Masera M., Trombetta A. Design and implementation of a secure Modbus protocol. Critical Infrastructure Protection III 2009, 83-96. Springer, Heidelberg. C. Palmer, S. Shenoi (Eds.).
-
(2009)
Critical Infrastructure Protection III
, pp. 83-96
-
-
Fovino, I.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
52
-
-
84155171697
-
DNPSec. distributed network protocol version 3 (DNP3) security framework
-
Springer, Dordrecht, K. Elleithy, T. Sobh, A. Mahmood, M. Iskander, M. Karim (Eds.)
-
Majdalawieh M., Parisi-Presicce F., Wijesekera D. DNPSec. distributed network protocol version 3 (DNP3) security framework. Advances in Computer, Information and Systems Sciences, and Engineering 2007, 227-234. Springer, Dordrecht. K. Elleithy, T. Sobh, A. Mahmood, M. Iskander, M. Karim (Eds.).
-
(2007)
Advances in Computer, Information and Systems Sciences, and Engineering
, pp. 227-234
-
-
Majdalawieh, M.1
Parisi-Presicce, F.2
Wijesekera, D.3
-
53
-
-
84870378094
-
-
International Electrotechnical Commission, Power Systems Management and Associated Information Exchange - Data and Communications Security, Technical Specification IEC TS 62351, Geneva, Switzerland
-
International Electrotechnical Commission, Power Systems Management and Associated Information Exchange - Data and Communications Security, Technical Specification IEC TS 62351, Geneva, Switzerland, 2007.
-
(2007)
-
-
-
55
-
-
62349103379
-
-
Symantec, Mountain, View, California, 〈〉
-
J. Farshchi, Wireless intrusion detection systems, Symantec, Mountain, View, California, 2003 〈〉. http://www.symantec.com/connect/articles/wireless-intrusion-detection-systems.
-
(2003)
Wireless intrusion detection systems
-
-
Farshchi, J.1
-
56
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
Sun B., Osborne L., Xiao Y., Guizani S. Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications 2007, 14(5):56-63.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
|