메뉴 건너뛰기




Volumn 4, Issue 4, 2015, Pages 995-1017

Runtime-monitoring for industrial control systems

Author keywords

Cyber; Formal methods; ICS; ITL; Monitoring; Run time; SCADA; Security

Indexed keywords


EID: 84958150271     PISSN: None     EISSN: 20799292     Source Type: Journal    
DOI: 10.3390/electronics4040995     Document Type: Article
Times cited : (45)

References (42)
  • 2
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011, 9, 49–51.
    • (2011) IEEE Secur. Priv , vol.9 , pp. 49-51
    • Langner, R.1
  • 5
    • 84958193921 scopus 로고    scopus 로고
    • InformationWeek.com
    • Radvanovsky, B.; Brodsky, J. InformationWeek.com. 2013. Available online: http://www.informationweek.co.uk/government/security/thousands-of-industrial-control-systems/240146091 (accessed on 2 May 2013).
    • (2013)
    • Radvanovsky, B.1    Brodsky, J.2
  • 6
    • 84901462416 scopus 로고    scopus 로고
    • Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices
    • Bodenheim, R.; Butts, J.; Dunlap, S.; Mullins, B. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastruct. Prot. 2014, 7, 114–123.
    • (2014) Int. J. Crit. Infrastruct. Prot , vol.7 , pp. 114-123
    • Bodenheim, R.1    Butts, J.2    Dunlap, S.3    Mullins, B.4
  • 9
    • 84958193922 scopus 로고    scopus 로고
    • ICS-CERT. ICS-CERT Monitor Newsletter
    • ICS-CERT. ICS-CERT Monitor Newsletter. 2015. Available online: https://ics-cert.us-cert.gov/si tes/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf (accessed on 3 September 2015).
    • (2015)
  • 10
    • 84958193923 scopus 로고    scopus 로고
    • Euractiv. EU, US go separate ways on cybersecurity
    • Euractiv. EU, US go separate ways on cybersecurity; 2013. Available online: http://www.euractiv.com/specialreport-cybersecurity/eu-us-set-different-approach-cyb-news-518252 (accessed on 3 May 2013).
    • (2013)
  • 11
    • 0040966892 scopus 로고    scopus 로고
    • Her Majesty’s Government. A Strong Britain in an Age of Uncertainty, Her Majesty’s Government: London, UK
    • Her Majesty’s Government. A Strong Britain in an Age of Uncertainty: The National Security Strategy; Her Majesty’s Government: London, UK, 2010.
    • (2010) The National Security Strategy
  • 13
    • 84928173034 scopus 로고    scopus 로고
    • Integrated OCSVM Mechanism for intrusion detection in SCADA systems
    • Maglaras, L.A.; Jiang, J.; Cruz, T.J. Integrated OCSVM Mechanism for intrusion detection in SCADA systems. Electron. Lett. 2014, 50, 1935–1936.
    • (2014) Electron. Lett , vol.50 , pp. 1935-1936
    • Maglaras, L.A.1    Jiang, J.2    Cruz, T.J.3
  • 19
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • Igure, V.M.; Laughter, S.A.; Williams, R.D. Security issues in SCADA networks. Comput. Secur. 2006, 25, 498–506.
    • (2006) Comput , vol.25 , pp. 498-506
    • Igure, V.M.1    Laughter, S.A.2    Williams, R.D.3
  • 23
    • 0142152297 scopus 로고    scopus 로고
    • Executing the Formal Semantics of the Accellera Property Specification Language by Mechanised Theorem Proving
    • Springer: Berlin, Germany
    • Gordon, M.; Hurd, J.; Slind, K. Executing the Formal Semantics of the Accellera Property Specification Language by Mechanised Theorem Proving. In Correct Hardware Design and Verification Methods; Lecture Notes in Computer Science; Springer: Berlin, Germany, 2003; Volume 2860; pp. 200–215.
    • (2003) Correct Hardware Design and Verification Methods; Lecture Notes in Computer Science; , vol.2860 , pp. 200-215
    • Gordon, M.1    Hurd, J.2    Slind, K.3
  • 25
    • 35648949009 scopus 로고    scopus 로고
    • Efficient Automata-Based Assertion-Checker Synthesis of SEREs for Hardware Emulation
    • Pacifico Yokohama, Japan, 23–26 January 2007; IEEE Computer Society: Washington, DC, USA
    • Boule, M.; Zilic, Z. Efficient Automata-Based Assertion-Checker Synthesis of SEREs for Hardware Emulation. In Proceedings of the 2007 Asia and South Pacific Design Automation Conference (ASP-DAC’07), Pacifico Yokohama, Japan, 23–26 January 2007; IEEE Computer Society: Washington, DC, USA, 2007; pp. 324–329.
    • (2007) Proceedings of the 2007 Asia and South Pacific Design Automation Conference (ASP-DAC’07) , pp. 324-329
    • Boule, M.1    Zilic, Z.2
  • 26
    • 1842789901 scopus 로고    scopus 로고
    • Checking Finite Traces Using Alternating Automata. Form. Methods Syst
    • Finkbeiner, B.; Sipma, H. Checking Finite Traces Using Alternating Automata. Form. Methods Syst. Des. 2004, 24, 101–127.
    • (2004) Des , vol.24 , pp. 101-127
    • Finkbeiner, B.1    Sipma, H.2
  • 27
    • 41849151734 scopus 로고    scopus 로고
    • Engineering of An Assertion-based PSLSimple-Verilog Dynamic Verifier by Alternating Automata. Electron. Notes Theor. Comput
    • Jin, N.; Shen, C.; Chen, J.; Ni, T. Engineering of An Assertion-based PSLSimple-Verilog Dynamic Verifier by Alternating Automata. Electron. Notes Theor. Comput. Sci. 2008, 207, 153–169.
    • (2008) Sci , vol.207 , pp. 153-169
    • Jin, N.1    Shen, C.2    Chen, J.3    Ni, T.4
  • 29
    • 17644397342 scopus 로고    scopus 로고
    • Run-time analysis of time-critical systems
    • Zhou, S.; Zedan, H.; Cau, A. Run-time analysis of time-critical systems. J. Syst. Arch. 2005, 51, 331–345.
    • (2005) J. Syst. Arch , vol.51 , pp. 331-345
    • Zhou, S.1    Zedan, H.2    Cau, A.3
  • 31
    • 17444417374 scopus 로고    scopus 로고
    • Rewriting-Based Techniques for Runtime Verification
    • Rosu, G.; Havelund, K. Rewriting-Based Techniques for Runtime Verification. Autom. Softw. Eng. 2005, 12, 151–197.
    • (2005) Autom. Softw. Eng , vol.12 , pp. 151-197
    • Rosu, G.1    Havelund, K.2
  • 32
    • 77952939028 scopus 로고    scopus 로고
    • Rule Systems for Run-time Monitoring: From Eagle to RuleR
    • Barringer, H.; Rydeheard, D.E.; Havelund, K. Rule Systems for Run-time Monitoring: From Eagle to RuleR. J. Logic. Comput. 2010, 20, 675–706.
    • (2010) J. Logic. Comput , vol.20 , pp. 675-706
    • Barringer, H.1    Rydeheard, D.E.2    Havelund, K.3
  • 35
    • 0028510891 scopus 로고
    • The Purdue enterprise reference architectur
    • Williams, T. The Purdue enterprise reference architectur. Comput. Ind. 1994, 24, 141–158.
    • (1994) Comput. Ind , vol.24 , pp. 141-158
    • Williams, T.1
  • 36
    • 84958164197 scopus 로고    scopus 로고
    • United States Department of Homeland Security, U.D. Recommended Practice:,; United States Department of Homeland Security: Washington, DC, USA
    • United States Department of Homeland Security, U.D. Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategie; United States Department of Homeland Security: Washington, DC, USA, 2009.
    • Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategie
  • 38
    • 84958193926 scopus 로고    scopus 로고
    • CPNI. Security for Industrial Control systems, Good practice guide
    • CPNI. Security for Industrial Control systems, Good practice guide. 2015. Available online: https://www.cpni.gov.uk/Documents/Publications/2015/12-May-2015-SICS%20-%20Framework %20Overview%20Final%20v1%202.pdf (accessed on 15 July 2015)
    • (2015)
  • 41
    • 0004325322 scopus 로고
    • Ph.D. Thesis, The Trinity College, University of Cambridge: Cambridge, UK
    • Hale, R.W.S. Programming in Temporal Logic. Ph.D. Thesis, The Trinity College, University of Cambridge: Cambridge, UK, 1988.
    • (1988) Programming in Temporal Logic.
    • Hale, R.W.S.1
  • 42
    • 84949221392 scopus 로고    scopus 로고
    • Compositional Reasoning Using Interval Temporal Logic and Tempura
    • The Significant Difference; Roever, W.P.D., Langmaack, H., Pnueli, A., Eds.; Springer Verlag: Berlin, Germany
    • Moszkowski, B. Compositional Reasoning Using Interval Temporal Logic and Tempura. In Compositionality: The Significant Difference; Roever, W.P.D., Langmaack, H., Pnueli, A., Eds.; Springer Verlag: Berlin, Germany, 1998; Volume 1486, pp. 439–464.
    • (1998) Compositionality , vol.1486 , pp. 439-464
    • Moszkowski, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.