filename stringlengths 34 130 | summary stringlengths 470 109k | body stringlengths 254 172k |
|---|---|---|
Attacking_SCADA_systems_A_practical_perspective.pdf | As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation Control System (IACS) architectures became more open and interconnected, some of their remotely controlled processes also became more exposed to cyber threats. Aspects such as the use of mature technologies and legacy equipment or even th... | Attacking SCADA systems: a practical perspective Lu s Rosa1, Tiago Cruz1, Paulo Sim es1, Edmundo Monteiro1, Leonid Lev2 1CISUC-DEI, University of Coimbra, Portugal 2IEC Israel Electric Corportation, Israel {lmrosa, tjcruz, psimoes, edmundo}@dei.uc.pt, leonid.lev@iec.co.il Keywords Industrial Control Systems, SCADA, S... |
PLC_Code-Level_Vulnerabilities.pdf | C ode vulnerabilities in the ladder logic of PLCs (Programmable Logic Controllers) have not been sufficiently addressed in the literature. Most of the research related to PLC threats or attacks focuses on the hardware portion of ICS (Industrial Control Systems) or SCADA (Supervisory Control and Data Acquisition) system... | PLC Code-Level Vulnerabilities Abraham Serhane1, 2, Mohamad Raad1 1International University of Beirut 146404 Mazraa, Beirut, Lebanon Email: as254@uowmail.edu.au Raad Raad2, Willy Susilo2 2University of Wollongong, Northfields Ave, Wollongong NSW 2522, Australia Index Terms DoS: Denial of Service, HMI: Human Machine I... |
Applying_static_code_analysis_on_industrial_controller_code.pdf | Static code analysis techniques are a well- established tool to improve the e ciency of software developers and for checking the correctness of safety-critical software com- ponents. However , their use is often limited to general purpose or mainstream programming languages. For these languages, static code analysis ... | Applying Static Code Analysis on Industrial Controller Code Stefan Stattelmann , Sebastian Biallas , Bastian Schlich , and Stefan Kowalewski ABB Corporate Research Germany, Ladenburg, Germany Email: rstname.lastname@de.abb.com Embedded Software Laboratory, RWTH Aachen University, Aachen, Germany Email: lastname@emb... |
Applying_Model_Checking_to_Industrial-Sized_PLC_Programs.pdf | Programmable logic controllers (PLCs) are embed- ded computers widely used in industrial control systems. Ensuringthat a PLC software complies with its speci cation is a challeng-ing task. Formal veri cation has become a recommended practiceto ensure the correctness of safety-critical software, but is stillunderused in... | 1400 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 11, NO. 6, DECEMBER 2015 Applying Model Checking to Industrial-Sized PLC Programs Borja Fern ndez Adiego, D niel Darvas, Enrique Blanco Vi uela, Jean-Charles Tournier, Member , IEEE , Simon Bliudze, Jan Olaf Blech, Member , IEEE , and V ctor Manuel Gonz lez Su rez |
Research_Trends_Challenges_and_Emerging_Topics_in_Digital_Forensics_A_Review_of_Reviews.pdf | "Due to its critical role in cybersecurity, digital forensics has received signi cant attention from(...TRUNCATED) | "Received January 22, 2022, accepted February 16, 2022, date of publication February 24, 2022, date (...TRUNCATED) |
Security_Challenges_in_Control_Network_Protocols_A_Survey.pdf | "With the ongoing adoption of remotely communicating and interacting control systems harboredby crit(...TRUNCATED) | "IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 21, NO. 1, FIRST QUARTER 2019 619 Security Challenges(...TRUNCATED) |
"On_Experimental_validation_of_Whitelist_Auto-Generation_Method_for_Secured_Programmable_Logic_Contr(...TRUNCATED) | "This paper considers a whitelisting system for programmable logic controllers (PLCs). In control sy(...TRUNCATED) | "On Experimental validation of Whitelist Auto- Generation Method for Secured Programmable Logic Cont(...TRUNCATED) |
Formalization_and_Verification_of_PLC_Timers_in_Coq.pdf | "Programmable logic controllers (PLCs) are widely used in embedded systems. A timer plays a pivotal (...TRUNCATED) | "Formalization and Veri cation of PLC Timers in Coq Hai Wan Key Lab for ISS of MOE, Tsinghua Nationa(...TRUNCATED) |
Towards_Automated_Safety_Vetting_of_PLC_Code_in_Real-World_Plants.pdf | "Safety violations in programmable logic controllers (PLCs), caused either by faults or attacks, hav(...TRUNCATED) | "Towards Automated Safety Vetting of PLC Code in Real-World Plants Mu Zhang , Chien-Ying Chen , Bin-(...TRUNCATED) |
An_Enhanced_Multi-Stage_Semantic_Attack_Against_Industrial_Control_Systems.pdf | "Industrial Control Systems (ICS) play a very important role in national critical infrastructures. H(...TRUNCATED) | "SPECIAL SECTION ON DISTRIBUTED COMPUTING INFRASTRUCTURE FOR CYBER-PHYSICAL SYSTEMS Received Septemb(...TRUNCATED) |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 5