메뉴 건너뛰기




Volumn , Issue , 2016, Pages 67-72

Detecting PLC control corruption via on-device runtime verification

Author keywords

[No Author keywords available]

Indexed keywords

ACCIDENT PREVENTION; COMPUTATION THEORY; COMPUTER CIRCUITS; CONTROLLERS; EMBEDDED SYSTEMS; INTRUSION DETECTION; MERCURY (METAL); ONLINE SYSTEMS; PROGRAMMED CONTROL SYSTEMS; RECONFIGURABLE HARDWARE; SAFETY ENGINEERING;

EID: 84991780822     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RWEEK.2016.7573309     Document Type: Conference Paper
Times cited : (31)

References (18)
  • 1
    • 84940027328 scopus 로고    scopus 로고
    • US ICS-CERT, November/December 2015
    • US ICS-CERT. (2015) ICS CERT Monitor, November/December 2015. https://ics-cert.us-cert.gov/monitors/ICS-MM201512.
    • (2015) ICS CERT Monitor
  • 5
    • 84921416016 scopus 로고    scopus 로고
    • Detecting industrial control malware using automated plc code analytics
    • IEEE
    • S. Zonouz, J. Rrushi, and S. McLaughlin, "Detecting industrial control malware using automated plc code analytics, " Security & Privacy, IEEE, vol. 12, no. 6, pp. 40-47, 2014.
    • (2014) Security & Privacy , vol.12 , Issue.6 , pp. 40-47
    • Zonouz, S.1    Rrushi, J.2    McLaughlin, S.3
  • 6
    • 85001619835 scopus 로고    scopus 로고
    • Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics
    • A. Kleinman and A. Wool, "Accurate modeling of the siemens s7 scada protocol for intrusion detection and digital forensics, " The Journal of Digital Forensics, Security and Law: JDFSL, vol. 9, no. 2, p. 37, 2014.
    • (2014) The Journal of Digital Forensics, Security and Law: JDFSL , vol.9 , Issue.2 , pp. 37
    • Kleinman, A.1    Wool, A.2
  • 9
    • 84991755285 scopus 로고    scopus 로고
    • Wireshark
    • Wireshark. (2016) tshark. https://www.wireshark.org/docs/man-pages/ tshark.html.
    • (2016) Tshark
  • 11
    • 84881143298 scopus 로고    scopus 로고
    • Guide to industrial control systems (ics) security
    • K. Stouffer, J. Falco, and K. Scarfone, "Guide to industrial control systems (ics) security, " NIST special publication, vol. 800, no. 82, pp. 16-16, 2011.
    • (2011) NIST Special Publication , vol.800 , Issue.82 , pp. 16
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 13
    • 84869424159 scopus 로고    scopus 로고
    • Are the nerc cips making the grid less reliable
    • J. Weiss, "Are the nerc cips making the grid less reliable, " Control Global, 2009.
    • (2009) Control Global
    • Weiss, J.1
  • 14
    • 78650891506 scopus 로고    scopus 로고
    • Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
    • L. Pietre-Cambacédes, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs, " Power Delivery, IEEE Transactions on, vol. 26, no. 1, pp. 161-172, 2011.
    • (2011) Power Delivery, IEEE Transactions on , vol.26 , Issue.1 , pp. 161-172
    • Pietre-Cambacédes, L.1    Tritschler, M.2    Ericsson, G.N.3
  • 17
    • 84977858742 scopus 로고    scopus 로고
    • Avatar: A framework to support dynamic security analysis of embedded systems' firmwares
    • J. Zaddach, L. Bruno, A. Francillon, and D. Balzarotti, "Avatar: A framework to support dynamic security analysis of embedded systems' firmwares." in NDSS, 2014.
    • (2014) NDSS
    • Zaddach, J.1    Bruno, L.2    Francillon, A.3    Balzarotti, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.