메뉴 건너뛰기




Volumn 7, Issue 4, 2014, Pages 213-232

Vulnerabilities of cyber-physical systems to stale data-Determining the optimal time to launch attacks

Author keywords

Best choice problem; Cyber physical systems; Secretary problem; Timing attacks

Indexed keywords

CONTROLLERS; CYBER PHYSICAL SYSTEM; DIGITAL STORAGE; EMBEDDED SYSTEMS; OPTIMAL SYSTEMS; SIDE CHANNEL ATTACK;

EID: 84918570655     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2014.10.003     Document Type: Article
Times cited : (55)

References (43)
  • 1
    • 0003529549 scopus 로고
    • Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160 MW Unit
    • LUTFDF2/(TFRT-3192)/1-137/(1987), Department of Automatic Control, Lund Institute of Technology, Lund, Sweden.
    • R. Bell, K. Åström, Dynamic Models for Boiler-Turbine Alternator Units: Data Logs and Parameter Estimation for a 160 MW Unit, LUTFDF2/(TFRT-3192)/1-137/(1987), Department of Automatic Control, Lund Institute of Technology, Lund, Sweden, 1987.
    • (1987)
    • Bell, R.1    Åström, K.2
  • 5
    • 0141566630 scopus 로고    scopus 로고
    • A nonlinear dynamic model of a vinyl acetate process
    • Chen R., Dave K., McAvoy T., Luyben M. A nonlinear dynamic model of a vinyl acetate process. Ind. Eng. Chem. Res. 2003, 42(20):4478-4487.
    • (2003) Ind. Eng. Chem. Res. , vol.42 , Issue.20 , pp. 4478-4487
    • Chen, R.1    Dave, K.2    McAvoy, T.3    Luyben, M.4
  • 6
    • 84918546083 scopus 로고    scopus 로고
    • Common Cybersecurity Vulnerabilities in Industrial Control Systems, Department of Homeland Security
    • Washington, DC
    • Control Systems Security Program, Common Cybersecurity Vulnerabilities in Industrial Control Systems, Department of Homeland Security, Washington, DC, 2011.
    • (2011)
  • 7
    • 84918564112 scopus 로고    scopus 로고
    • Further Information Regarding the Release of DNP3 Secure Authentication Version 5 (SAv5)
    • Raleigh, North Carolina
    • DNP3 Users Group, Further Information Regarding the Release of DNP3 Secure Authentication Version 5 (SAv5), Raleigh, North Carolina (url: 〈〉. http://www.dnp.org/DNP3Downloads/DNP3.
  • 8
    • 0027561446 scopus 로고
    • A plant-wide industrial process control problem
    • Downs J., Vogel E. A plant-wide industrial process control problem. Comput. Chem. Eng. 1993, 17(3):245-255.
    • (1993) Comput. Chem. Eng. , vol.17 , Issue.3 , pp. 245-255
    • Downs, J.1    Vogel, E.2
  • 9
    • 84972507662 scopus 로고
    • Who solved the Secretary Problem
    • Ferguson T. Who solved the Secretary Problem. Stat. Sci. 1989, 4(3):282-296.
    • (1989) Stat. Sci. , vol.4 , Issue.3 , pp. 282-296
    • Ferguson, T.1
  • 10
    • 0000945144 scopus 로고
    • The Secretary Problem and its extensions. A review
    • Freeman P. The Secretary Problem and its extensions. A review. Revue Int. Stat. 1983, 51(2):189-206.
    • (1983) Revue Int. Stat. , vol.51 , Issue.2 , pp. 189-206
    • Freeman, P.1
  • 12
    • 84986272600 scopus 로고    scopus 로고
    • Impact of network infrastructure parameters on the effectiveness of cyber attacks against industrial control systems
    • Genge B., Siaterlis C., Hohenadel M. Impact of network infrastructure parameters on the effectiveness of cyber attacks against industrial control systems. Int. J. Comput. Commun. Control 2012, 7(4):673-686.
    • (2012) Int. J. Comput. Commun. Control , vol.7 , Issue.4 , pp. 673-686
    • Genge, B.1    Siaterlis, C.2    Hohenadel, M.3
  • 13
    • 0002737066 scopus 로고
    • Recognizing the maximum of a sequence
    • Gilbert J., Mosteller F. Recognizing the maximum of a sequence. J. Am. Stat. Assoc. 1966, 61(313):35-73.
    • (1966) J. Am. Stat. Assoc. , vol.61 , Issue.313 , pp. 35-73
    • Gilbert, J.1    Mosteller, F.2
  • 14
    • 84864415794 scopus 로고    scopus 로고
    • A log mining approach for process monitoring in SCADA
    • Hadziosmanovic D., Bolzoni D., Hartel P. A log mining approach for process monitoring in SCADA. Int. J. Inf. Security 2012, 11(4):231-251.
    • (2012) Int. J. Inf. Security , vol.11 , Issue.4 , pp. 231-251
    • Hadziosmanovic, D.1    Bolzoni, D.2    Hartel, P.3
  • 16
    • 84918504933 scopus 로고    scopus 로고
    • Breakage, presented at Black Hat Federal
    • J. Larsen, Breakage, presented at Black Hat Federal, 2008.
    • (2008)
    • Larsen, J.1
  • 17
    • 84918579842 scopus 로고    scopus 로고
    • Miniaturization, presented at Black Hat USA
    • Larsen J.
    • J. Larsen, Miniaturization, presented at Black Hat USA, 2014.
    • (2014)
  • 18
    • 0035980388 scopus 로고    scopus 로고
    • Self-optimizing control of a large-scale plant. The Tennessee Eastman process
    • Larsson T., Hestetun K., Hovland E., Skogestad S. Self-optimizing control of a large-scale plant. The Tennessee Eastman process. Ind. Eng. Chem. Res. 2001, 40(22):4489-4901.
    • (2001) Ind. Eng. Chem. Res. , vol.40 , Issue.22 , pp. 4489-4901
    • Larsson, T.1    Hestetun, K.2    Hovland, E.3    Skogestad, S.4
  • 24
    • 85041156174 scopus 로고    scopus 로고
    • Lees[U+05F3] Loss Prevention in the Process Industries: Hazard Identification, Assessment and Control
    • Butterworth Heinemann, Oxford, United Kingdom
    • S. Mannan, Lees[U+05F3] Loss Prevention in the Process Industries: Hazard Identification, Assessment and Control, vol. 1, Butterworth Heinemann, Oxford, United Kingdom, 2012.
    • (2012) , vol.1
    • Mannan, S.1
  • 25
    • 0028431355 scopus 로고
    • Base control for the Tennessee Eastman problem
    • McAvoy T., Ye N. Base control for the Tennessee Eastman problem. Comput. Chem. Eng. 1994, 18(5):383-413.
    • (1994) Comput. Chem. Eng. , vol.18 , Issue.5 , pp. 383-413
    • McAvoy, T.1    Ye, N.2
  • 26
    • 78651084507 scopus 로고    scopus 로고
    • Detecting sensor signal manipulations in non-linear chemical processes
    • Springer, Heidelberg, Germany, T. Moore, S. Shenoi (Eds.)
    • McEvoy T., Wolthusen S. Detecting sensor signal manipulations in non-linear chemical processes. Critical Infrastructure Protection IV 2010, 81-94. Springer, Heidelberg, Germany. T. Moore, S. Shenoi (Eds.).
    • (2010) Critical Infrastructure Protection IV , pp. 81-94
    • McEvoy, T.1    Wolthusen, S.2
  • 27
    • 84958755281 scopus 로고    scopus 로고
    • A plant-wide industrial process control security problem
    • Springer, Heidelberg, Germany, J. Butts, S. Shenoi (Eds.)
    • McEvoy T., Wolthusen S. A plant-wide industrial process control security problem. Critical Infrastructure Protection V 2011, 47-56. Springer, Heidelberg, Germany. J. Butts, S. Shenoi (Eds.).
    • (2011) Critical Infrastructure Protection V , pp. 47-56
    • McEvoy, T.1    Wolthusen, S.2
  • 28
    • 84918531952 scopus 로고    scopus 로고
    • Using smart instrumentation, Control Engineering
    • April 8
    • C. McIntyre, Using smart instrumentation, Control Engineering (url:〈〉), April 8, 2011. http://www.controleng.com/single-article/using-smart-instrumentation/a0ec350155bb86c8f65377ba66e59df8.html.
    • (2011)
    • McIntyre, C.1
  • 32
    • 84891808534 scopus 로고    scopus 로고
    • Design and implementation of a secure Modbus protocol
    • Springer, Heidelberg, Germany, C. Palmer, S. Shenoi (Eds.)
    • Nai Fovino I., Carcano A., Masera M., Trombetta A. Design and implementation of a secure Modbus protocol. Critical Infrastructure Protection III 2009, 83-96. Springer, Heidelberg, Germany. C. Palmer, S. Shenoi (Eds.).
    • (2009) Critical Infrastructure Protection III , pp. 83-96
    • Nai Fovino, I.1    Carcano, A.2    Masera, M.3    Trombetta, A.4
  • 35
    • 84918550880 scopus 로고    scopus 로고
    • Tennessee Eastman Challenge Archive, Department of Chemical Engineering, University of Washington
    • Seattle, Washington
    • N. Ricker, Tennessee Eastman Challenge Archive, Department of Chemical Engineering, University of Washington, Seattle, Washington (url: 〈〉), 2014. http://depts.washington.edu/control/LARRY/TE/download.html.
    • (2014)
    • Ricker, N.1
  • 36
    • 0029378861 scopus 로고
    • Nonlinear model predictive control of the Tennessee Eastman challenge process
    • Ricker N., Lee J. Nonlinear model predictive control of the Tennessee Eastman challenge process. Comput. Chem. Eng. 1995, 19(9):961-981.
    • (1995) Comput. Chem. Eng. , vol.19 , Issue.9 , pp. 961-981
    • Ricker, N.1    Lee, J.2
  • 38
    • 84918595407 scopus 로고    scopus 로고
    • Here be backdors: A journey into the secrets of industrial firmware
    • R. Santamarta, Here be backdors: A journey into the secrets of industrial firmware, in: presented at Black Hat USA, 2012.
    • (2012) presented at Black Hat USA
    • Santamarta, R.1
  • 39
    • 84897668937 scopus 로고    scopus 로고
    • An evaluation of modification attacks on programmable logic controllers
    • Schuett C., Butts J., Dunlap S. An evaluation of modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 2014, 7(1):61-68.
    • (2014) Int. J. Crit. Infrastruct. Prot. , vol.7 , Issue.1 , pp. 61-68
    • Schuett, C.1    Butts, J.2    Dunlap, S.3
  • 41
    • 84861440639 scopus 로고    scopus 로고
    • BP America Refinery Explosion: Final Investigation Report
    • Washington, DC
    • U.S. Chemical Safety and Hazard Investigation Board, BP America Refinery Explosion: Final Investigation Report, Report No. 2005-04-I-TX, Washington, DC, 2007.
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.