메뉴 건너뛰기




Volumn 8, Issue , 2015, Pages 40-52

A language for describing attacks on cyber-physical systems

Author keywords

Attack description language; Cross domain attacks; Cyber physical systems; Security; Taxonomy

Indexed keywords

COMPUTER CRIME; EMBEDDED SYSTEMS; KNOWLEDGE BASED SYSTEMS; TAXONOMIES;

EID: 84922266749     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2014.09.003     Document Type: Article
Times cited : (61)

References (20)
  • 2
    • 84922213051 scopus 로고    scopus 로고
    • The OVAL Language Specification, MITRE, Bedford, Massachusetts
    • J. Baker, M. Hansbury, D. Haynes, The OVAL Language Specification, MITRE, Bedford, Massachusetts (url: 〈〉), 2011. http://ebookbrowsee.net/oval-language-specification-08-08-2011-pdf-d222972411.
    • (2011)
    • Baker, J.1    Hansbury, M.2    Haynes, D.3
  • 3
    • 20944436226 scopus 로고    scopus 로고
    • The myths and facts behind cyber security risks for industrial control systems
    • in: Proceedings of the VDE Kongress
    • E. Byres, J. Lowe, The myths and facts behind cyber security risks for industrial control systems, in: Proceedings of the VDE Kongress, 2004.
    • (2004)
    • Byres, E.1    Lowe, J.2
  • 5
    • 84922233263 scopus 로고    scopus 로고
    • W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California
    • N. Falliere, L. O'Murchu, E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011.
    • (2011)
    • Falliere, N.1    O'Murchu, L.2    Chien, E.3
  • 6
    • 84904880459 scopus 로고    scopus 로고
    • SecureCPS: defending a nanosatellite cyber-physical system
    • in: Proceedings of the SPIE, 9085
    • L. Forbes, H. Vu, B. Udrea, H. Hagar, X. Koutsoukos, M. Yampolskiy, SecureCPS: defending a nanosatellite cyber-physical system, in: Proceedings of the SPIE, 9085, 2014.
    • (2014)
    • Forbes, L.1    Vu, H.2    Udrea, B.3    Hagar, H.4    Koutsoukos, X.5    Yampolskiy, M.6
  • 7
    • 84922253535 scopus 로고    scopus 로고
    • Ataxonomy of network and computer attacks Comput
    • S. Hansman, R. Hunt; Ataxonomy of network and computer attacks Comput. Secur. 241 2005, 3143.
    • (2005) Secur , vol.241 , pp. 3143
    • Hansman, S.1    Hunt, R.2
  • 8
    • 84922248116 scopus 로고    scopus 로고
    • Understanding the physical and economic consequences of attacks on control systems Int
    • Prot.232009
    • Y. Huang, A. Cardenas, S. Amin, Z. Lin, H. Tsai, S. Sastry; Understanding the physical and economic consequences of attacks on control systems Int. J. Crit. Infrastruct. Prot.232009, 7383.
    • J. Crit. Infrastruct , pp. 7383
    • Huang, Y.1    Cardenas, A.2    Amin, S.3    Lin, Z.4    Tsai, H.5    Sastry, S.6
  • 9
    • 84922261934 scopus 로고    scopus 로고
    • ITU-T Recommendation X.1520, Geneva, Switzerland
    • International Telecommunications Union, ITU-T Recommendation X.1520, Geneva, Switzerland (url: 〈〉), 2014. http://www.itu.int/rec/T-REC-X.1520-201104-I/en.
    • (2014)
  • 11
    • 84922253417 scopus 로고    scopus 로고
    • Stuxnet 0.5: The Missing Link, Symantec, Mountain View, California
    • G. McDonald, L.O Murchu, S. Doherty, E. Chien, Stuxnet 0.5: The Missing Link, Symantec, Mountain View, California, 2013.
    • (2013)
    • McDonald, G.1    Murchu, L.O2    Doherty, S.3    Chien, E.4
  • 12
    • 84922256555 scopus 로고    scopus 로고
    • Common Vulnerabilities and Exposures, Bedford, Massachusetts
    • MITRE, Common Vulnerabilities and Exposures, Bedford, Massachusetts (url: 〈〉). http://cve.mitre.org.
  • 13
    • 84922223637 scopus 로고    scopus 로고
    • OVAL Language, Bedford, Massachusetts
    • MITRE, OVAL Language, Bedford, Massachusetts (url: 〈〉). http://oval.mitre.org/language.
  • 14
    • 84922245995 scopus 로고    scopus 로고
    • CVE XML Schema, Gaithersburg, Maryland
    • National Institute of Standards and Technology, CVE XML Schema, Gaithersburg, Maryland (url: 〈〉). http://nvd.nist.gov/schema/nvd-cve-feed_2.0.xsd.
  • 15
    • 84922247382 scopus 로고    scopus 로고
    • National Vulnerability Database, Gaithersburg, Maryland
    • National Institute of Standards and Technology, National Vulnerability Database, Gaithersburg, Maryland (url: 〈〉). http://nvd.nist.gov.
  • 16
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure interdependencies
    • S. Rinaldi, J. Peerenboom, T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems 21(6), pp. 11-25.
    • IEEE Control Systems , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.1    Peerenboom, J.2    Kelly, T.3
  • 17
    • 84922258861 scopus 로고    scopus 로고
    • Lessons learned from the Maroochy water breach E
    • Shenoi Critical Infrastructure Protection, Springer, Boston, Massachusetts 7382.
    • J. Slay, M. Miller; Lessons learned from the Maroochy water breach E. GoetzS. Shenoi Critical Infrastructure Protection 2007,Springer, Boston, Massachusetts 7382.
    • (2007) GoetzS
    • Slay, J.1    Miller, M.2
  • 18
    • 84922217169 scopus 로고    scopus 로고
    • 2014 Alerts, Washington, DC
    • United States Computer Emergency Readiness Team, 2014 Alerts, Washington, DC (url: 〈〉), 2014. http://www.us-cert.gov/ncas/alerts.
    • (2014)
  • 19
    • 84868596713 scopus 로고    scopus 로고
    • Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
    • in: Proceedings of the Fifth International Symposium on Resilient Control Systems
    • M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, J. Sztipanovits, Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach, in: Proceedings of the Fifth International Symposium on Resilient Control Systems, 2012, pp. 55-62.
    • (2012) , pp. 55-62
    • Yampolskiy, M.1    Horvath, P.2    Koutsoukos, X.3    Xue, Y.4    Sztipanovits, J.5
  • 20
    • 84877598718 scopus 로고    scopus 로고
    • Taxonomy for descriptions of cross-domain attacks on CPSs
    • in: Proceedings of the Second ACM International Conference on High Confidence Networked Systems
    • M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, J. Sztipanovits, Taxonomy for descriptions of cross-domain attacks on CPSs, in: Proceedings of the Second ACM International Conference on High Confidence Networked Systems, 2013, pp. 135-142.
    • (2013) , pp. 135-142
    • Yampolskiy, M.1    Horvath, P.2    Koutsoukos, X.3    Xue, Y.4    Sztipanovits, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.