-
1
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
S.Rinaldi, J.Peerenboom, and T.Kelly, "Identifying, understanding, and analyzing critical infrastructure interdependencies," Control Systems, vol.21, no.6, pp.11-25, 2001.
-
(2001)
Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
2
-
-
84889027178
-
From insider threats to business processes that are secure-by-design
-
D.Gollmann, "From insider threats to business processes that are secure-by-design," in INCoS, 2011, p.627.
-
(2011)
INCoS
, pp. 627
-
-
Gollmann, D.1
-
3
-
-
84889046029
-
Network secures process control
-
E.Byres, "Network secures process control," InTech Magazine, 1998.
-
(1998)
InTech Magazine
-
-
Byres, E.1
-
5
-
-
84889037843
-
-
Project Basecamp
-
"Project Basecamp," http://www.digitalbond.com/tools/basecamp, 2011.
-
-
-
-
8
-
-
84918595407
-
HERE BE BACKDOORS: A jorney into the secrets of industrial firmware
-
-,"HERE BE BACKDOORS: A jorney into the secrets of industrial firmware," Black Hat USA, 2012.
-
(2012)
Black Hat USA
-
-
Santamarta, R.1
-
9
-
-
84889061540
-
-
Vulnerability disclosure policy
-
"Vulnerability disclosure policy," http://ics-cert.us-cert.gov/ icscert/ disclosure.html, ICS-CERT(USA), 2012.
-
-
-
-
11
-
-
84888987274
-
-
J.C.Matherly man SHODAN
-
J.C.Matherly, "man SHODAN," http://www.shodanhq.com/help, 2009.
-
-
-
-
12
-
-
78650062267
-
-
Symantic Security Response, Tech.Rep.
-
N.Falliere, L.O.Murchu, and E.Chien, "W32.Stuxnet Dossier," Symantic Security Response, Tech.Rep., 2010.
-
(2010)
W32.Stuxnet Dossier
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
13
-
-
84889013121
-
-
R.Lagner, "Blog," http://www.langner.com/en/blog/, 2010.
-
(2010)
-
-
Lagner, R.1
-
15
-
-
80054695924
-
The evolution of factory and building automation
-
T.Sauter, S.Soucek, W.Kastner, and D.Dietrich, "The evolution of factory and building automation," Industrial Electronics Magazine, IEEE, vol.5, no.3, pp.35-48, 2011.
-
(2011)
Industrial Electronics Magazine, IEEE
, vol.5
, Issue.3
, pp. 35-48
-
-
Sauter, T.1
Soucek, S.2
Kastner, W.3
Dietrich, D.4
-
16
-
-
84857595286
-
-
ESCoRTS, Deliverable: D22, Version:1.1
-
I.N.Fovino, A.Coletta, and M.Masera, "Taxonomy of security solutions for the SCADA sector," ESCoRTS, Deliverable: D22, Version:1.1, 2010.
-
(2010)
Taxonomy of Security Solutions for the SCADA Sector
-
-
Fovino, I.N.1
Coletta, A.2
Masera, M.3
-
18
-
-
84891752381
-
-
S.East, J.Butts, M.Papa, and S.Shenoi, "A taxonomy of attacks on theDNP3 protocol," 2009, pp.67-81.
-
(2009)
A Taxonomy of Attacks on theDNP3 Protocol
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
19
-
-
84155171697
-
DNPSec: Distributed network protocol version 3 (DNP3) security framework
-
M.Majdalawieh, F.Parisi-Presicce, and D.Wijesekera, "DNPSec: Distributed network protocol version 3 (DNP3) security framework," in Advances in CISSE, 2006, pp.227-234.
-
(2006)
Advances in CISSE
, pp. 227-234
-
-
Majdalawieh, M.1
Parisi-Presicce, F.2
Wijesekera, D.3
-
20
-
-
84874480673
-
SCADA protocol vulnerabilities
-
J.Rrushi, "SCADA protocol vulnerabilities," ser.LNCS, 2012, vol.7130, pp.150-176.
-
(2012)
Ser.LNCS
, vol.7130
, pp. 150-176
-
-
Rrushi, J.1
-
21
-
-
84891808534
-
-
I.Fovino, A.Carcano, M.Masera, and A.Trombetta, "Design and implementation of a secure modbus protocol," 2009, pp.83-96.
-
(2009)
Design and Implementation of A Secure Modbus Protocol
, pp. 83-96
-
-
Fovino, I.1
Carcano, A.2
Masera, M.3
Trombetta, A.4
-
22
-
-
55549084566
-
Combating memory corruption attacks on scada devices
-
C.Bellettini and J.Rrushi, "Combating memory corruption attacks on scada devices," in CIP II, 2009, pp.141-156.
-
(2009)
CIP II
, pp. 141-156
-
-
Bellettini, C.1
Rrushi, J.2
-
23
-
-
70449642862
-
Exploring security in PROFINET IO
-
J.A kerberg and M.Bjorkman, "Exploring security in PROFINET IO," in COMPSAC, 2009, pp.406-412.
-
(2009)
COMPSAC
, pp. 406-412
-
-
Kerberg, J.A..1
Bjorkman, M.2
-
24
-
-
70350453950
-
Exploring network security in PROFIsafe
-
-,"Exploring network security in PROFIsafe," in SAFECOMP, 2009, pp.67-80.
-
(2009)
SAFECOMP
, pp. 67-80
-
-
Kerberg, J.A..1
Bjorkman, M.2
-
25
-
-
84889071186
-
-
Black Hat USA
-
J.Larsen, "Breakage," Black Hat USA, 2007.
-
(2007)
Breakage
-
-
Larsen, J.1
-
26
-
-
80055005133
-
Myth or reality-Does the aurora vulnerability pose a risk to my generator
-
M.Zeller, "Myth or reality-does the aurora vulnerability pose a risk to my generator?" in Annual Conference for Protective Relay Engineers, 2011, pp.130-136.
-
(2011)
Annual Conference for Protective Relay Engineers
, pp. 130-136
-
-
Zeller, M.1
-
27
-
-
70349335710
-
SCADA malware, a proof of concept
-
A.Carcano, I.N.Fovino, M.Masera, and A.Trombetta, "SCADA malware, a proof of concept," in CRITIS, 2008, pp.211-222.
-
(2008)
CRITIS
, pp. 211-222
-
-
Carcano, A.1
Fovino, I.N.2
Masera, M.3
Trombetta, A.4
-
28
-
-
84869391514
-
On dynamic malware payloads aimed at programmable logic controllers
-
S.McLaughlin, "On dynamic malware payloads aimed at programmable logic controllers," in HotSec, 2011.
-
(2011)
HotSec
-
-
McLaughlin, S.1
-
29
-
-
84864202667
-
A first look into SCADA network traffic
-
R.R.R.Barbosa, R.Sadre, and A.Pras, "A first look into SCADA network traffic," in NOMS, 2012, pp.518-521.
-
(2012)
NOMS
, pp. 518-521
-
-
Barbosa, R.R.R.1
Sadre, R.2
Pras, A.3
-
30
-
-
84866543673
-
Challenges and opportunities in securing industrial control systems
-
D.Had?ziosmanovíc, D.Bolzoni, S.Etalle, and P.H.Hartel, "Challenges and opportunities in securing industrial control systems," in COMPENG, 2012, pp.1-6.
-
(2012)
COMPENG
, pp. 1-6
-
-
Hadziosmanovic, D.1
Bolzoni, D.2
Etalle, S.3
Hartel, P.H.4
-
31
-
-
84889034397
-
-
B.Genge, C.Siaterlis, I.N.Fovino, and M.Masera, "A cyber-physical experimentation environment for the security analysis of networked industrial control systems," 2012, vol.38, no.5.
-
(2012)
A Cyber-physical Experimentation Environment for the Security Analysis of Networked Industrial Control Systems
, vol.38
, Issue.5
-
-
Genge, B.1
Siaterlis, C.2
Fovino, I.N.3
Masera, M.4
-
32
-
-
77955698013
-
An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
-
I.Fovino, M.Masera, L.Guidi, and G.Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in Human System Interactions, 2010, pp.679-686.
-
(2010)
Human System Interactions
, pp. 679-686
-
-
Fovino, I.1
Masera, M.2
Guidi, L.3
Carpi, G.4
-
33
-
-
0027561446
-
-
J.J.Downs and E.F.Vogel, "A plant-wide industrial process control problem," 1993, vol.17, no.3, pp.245-255.
-
(1993)
A Plant-wide Industrial Process Control Problem
, vol.17
, Issue.3
, pp. 245-255
-
-
Downs, J.J.1
Vogel, E.F.2
-
35
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
A.A.Ćardenas, S.Amin, Z.-S.Lin, Y.-L.Huang, C.-Y.Huang, and S.Sastry, "Attacks against process control systems: risk assessment, detection, and response." in ASIACCS, 2011, pp.355-366.
-
(2011)
ASIACCS
, pp. 355-366
-
-
Cardenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
36
-
-
84958755281
-
A plant-wide industrial process control security problem
-
T.McEvoy and S.Wolthusen, "A plant-wide industrial process control security problem," in CIP V, 2011, pp.47-56.
-
(2011)
CIP v
, pp. 47-56
-
-
McEvoy, T.1
Wolthusen, S.2
-
37
-
-
84958780625
-
Analyzing cyberphysical attacks on networked industrial control systems
-
B.Genge, I.Nai Fovino, C.Siaterlis, and M.Masera, "Analyzing cyberphysical attacks on networked industrial control systems," in Critical Infrastructure Protection V, 2011, pp.167-183.
-
(2011)
Critical Infrastructure Protection v
, pp. 167-183
-
-
Genge, B.1
Nai Fovino, I.2
Siaterlis, C.3
Masera, M.4
-
38
-
-
78651084507
-
Detecting sensor signal manipulations in non-linear chemical processes
-
T.McEvoy and S.Wolthusen, "Detecting sensor signal manipulations in non-linear chemical processes," in CIP IV, 2010, vol.342, pp.81-94.
-
(2010)
CIP IV
, vol.342
, pp. 81-94
-
-
McEvoy, T.1
Wolthusen, S.2
-
39
-
-
84893445259
-
SCADA-specific intrusion detection/prevention systems: A survey and taxonomy
-
B.Zhu and S.Sastry, "SCADA-specific intrusion detection/prevention systems: a survey and taxonomy," in WSCS, 2010.
-
(2010)
WSCS
-
-
Zhu, B.1
Sastry, S.2
-
40
-
-
84859034021
-
Difficulties in modeling SCADA traffic: A comparative analysis
-
R.R.R.Barbosa, R.Sadre, and A.Pras, "Difficulties in modeling SCADA traffic: A comparative analysis," ser.LNCS, vol.7192, 2012, pp.126-135.
-
(2012)
Ser.LNCS
, vol.7192
, pp. 126-135
-
-
Barbosa, R.R.R.1
Sadre, R.2
Pras, A.3
-
41
-
-
36248966550
-
Security analysis of multilayer SCADA protocols
-
J.Edmonds, M.Papa, and S.Shenoi, "Security analysis of multilayer SCADA protocols," in Critical Infrastructure Protection, 2007, pp.205-221.
-
(2007)
Critical Infrastructure Protection
, pp. 205-221
-
-
Edmonds, J.1
Papa, M.2
Shenoi, S.3
-
42
-
-
84864405337
-
An ontology for identifying cyber intrusion induced faults in process control systems
-
J.Hieb, J.Graham, and J.Guan, "An ontology for identifying cyber intrusion induced faults in process control systems," in Critical Infrastructure Protection III, 2009, pp.125-138.
-
(2009)
Critical Infrastructure Protection III
, pp. 125-138
-
-
Hieb, J.1
Graham, J.2
Guan, J.3
-
43
-
-
84857408165
-
A formal adversary capability model for SCADA environments
-
T.R.McEvoy and S.D.Wolthusen, "A formal adversary capability model for SCADA environments," in CRITIS, 2011, pp.93-103.
-
(2011)
CRITIS
, pp. 93-103
-
-
McEvoy, T.R.1
Wolthusen, S.D.2
-
45
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
A.A.Ćardenas, S.Amin, and S.Sastry, "Secure control: Towards survivable cyber-physical systems," in WCPS, 2008, pp.495-500.
-
(2008)
WCPS
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
46
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
B.Zhu, A.Joseph, and S.Sastry, "A taxonomy of cyber attacks on SCADA systems," in iThings/CPSCom, 2011, pp.380-388.
-
(2011)
IThings/CPSCom
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
47
-
-
84863496164
-
Veracity plausibility and reputation
-
D.Gollmann, "Veracity, plausibility, and reputation." ser.LNCS, vol.7322, 2012, pp.20-28.
-
(2012)
Ser.LNCS
, vol.7322
, pp. 20-28
-
-
Gollmann, D.1
-
48
-
-
84986272600
-
Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems
-
B.Genge, C.Siaterlis, and M.Hohenadel, "Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems," IJCCC, vol.7, no.4, pp.673-686.
-
IJCCC
, vol.7
, Issue.4
, pp. 673-686
-
-
Genge, B.1
Siaterlis, C.2
Hohenadel, M.3
-
49
-
-
70149102885
-
Understanding the physical and economic consequences of attacks against control systems
-
Y.Huang, A.Cardenas, S.Amin, S.-Z.Lin, H.-Y.Tsai, and S.S.Sastry, "Understanding the physical and economic consequences of attacks against control systems." IJCIP, vol.2, no.3, pp.72-83, 2009.
-
(2009)
IJCIP
, vol.2
, Issue.3
, pp. 72-83
-
-
Huang, Y.1
Cardenas, A.2
Amin, S.3
Lin, Z.-S.4
Tsai, H.-Y.5
Sastry, S.S.6
-
50
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
S.Amin, A.A.Ćardenas, and S.Sastry, "Safe and secure networked control systems under denial-of-service attacks." ser.LNCS, 2009, pp.31-45.
-
(2009)
Ser.LNCS
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.A.2
Sastry, S.3
-
51
-
-
84864415794
-
A log mining approach for process monitoring in SCADA
-
D.Dina Had?ziosmanovíc and D.Bolzoni and P.H.Hartel, "A log mining approach for process monitoring in SCADA," IJIS, vol.11, pp.231-251, 2012.
-
(2012)
IJIS
, vol.11
, pp. 231-251
-
-
Hadziosmanovic, D.D.1
Bolzoni, D.2
Hartel, P.H.3
-
52
-
-
84879779698
-
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
-
N.Goldenberg and A.Wool, "Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems," IJCIP, no.0, 2013.
-
(2013)
IJCIP
-
-
Goldenberg, N.1
Wool, A.2
-
53
-
-
78651107078
-
Distributed intrusion detection system for SCADA protocols
-
I.Fovino, M.Masera, M.Guglielmi, A.Carcano, and A.Trombetta, "Distributed intrusion detection system for SCADA protocols," in Critical Infrastructure Protection IV, 2010, pp.95-110.
-
(2010)
Critical Infrastructure Protection IV
, pp. 95-110
-
-
Fovino, I.1
Masera, M.2
Guglielmi, M.3
Carcano, A.4
Trombetta, A.5
-
54
-
-
21644467485
-
Human-assisted intrusion detection for process control systems
-
M.Naedele and O.Biderbost, "Human-assisted intrusion detection for process control systems," in ACNS, 2004, pp.216-225.
-
(2004)
ACNS
, pp. 216-225
-
-
Naedele, M.1
Biderbost, O.2
-
55
-
-
80052082857
-
An exploration of defensive deception in industrial communication networks
-
J.L.Rrushi, "An exploration of defensive deception in industrial communication networks," IJCIP, vol.4, no.4, 2011.
-
(2011)
IJCIP
, vol.4
, Issue.4
-
-
Rrushi, J.L.1
-
56
-
-
84867893847
-
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
-
D.Had?ziosmanovíc, L.Simionato, D.Bolzoni, E.Zambon, and S.Etalle, "N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols," ser.LNCS, vol.7462, 2012, pp.354-373.
-
(2012)
Ser.LNCS
, vol.7462
, pp. 354-373
-
-
Hadziosmanovic, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
58
-
-
84889022780
-
-
Abnormal Situation Management
-
"Abnormal Situation Management," http://www.asmconsortium.net.
-
-
-
|