filename stringlengths 34 130 | summary stringlengths 481 5.43k | body stringlengths 14.5k 109k |
|---|---|---|
A_New_Injection_Threat_on_S7-1500_PLCs_-_Disrupting_the_Physical_Process_Offline.txt | Programmable Logic Controllers (PLCs) are increasingly connected and integrated into the Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined control process. But in fact, this brings also its security challenges and exposes them to various cyber-attacks targeting the physical p... | Received 6 December 2021; revised 22 January 2022; accepted 6 February 2022. Date of publication 14 February 2022; date of current version 2 March 2022. The review of this paper was arranged by Associate Editor Yang Shi. Digital Object Identi er 10.1109/OJIES.2022.3151528 A New Injection Threat on S7-1500 PLCs - Disrup... |
SCADA_honeypots_An_in-depth_analysis_of_Conpot.txt | Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devi ces in the wild, but also for early detection of potential mali cious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine i... | SCADA Honeypots An In-depth Analysis of Conpot Arthur Jicha, Mark Patton, and Hsinchun Chen University of Arizona Department of Management Information Systems Tucson, AZ 85721, USA ajicha@email.arizona.edu, mpatton@ema il.arizona.edu, hchen@eller.arizona.edu Keywords Supervisory Control and Data Acquisition systems, ho... |
Modeling_of_Cyber_Attacks_and_a_Time_Guard_Detection_for_ICS_based_on_Discrete_Event_Systems.txt | Due to the rapid increase in digitalization and networking of systems, especially in industrial environments, the number of cyber-physical systems is increasing and thus the danger of possible attacks on such systems. As demonstrated in several recent examples, a cyber attack on an industrial control system (ICS) can h... | Modeling of Cyber Attacks and a Time Guard Detection for ICS based on Discrete Event Systems Raphael Fritz, Patrick Schwarz, Ping Zhang I. INTRODUCTION The expansion and networking of systems in the context of Industry 4.0 and the Internet of Things is a top priority for many companies. This makes the security of IT... |
You_Are_What_You_Attack_Breaking_the_Cryptographically_Protected_S7_Protocol.txt | S7 protocol de nes an appropriate format for ex- changing messages between SIMATIC S7 PLCs and their corre- sponding engineering software i.e., TIA Portal. Recently, Siemens has provided its newer PLC models and their proprietary S7 protocols with a very developed and sophisticated integrity check mechanism to protect ... | You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol Wael Alsabbagh1,2and Peter Langend rfer1,2 1IHP Leibniz-Institut f r innovative Mikroelektronik, Frankfurt (Oder), Germany 2Brandenburg University of Technology Cottbus-Senftenberg, Cottbus, Germany E-mail: (Alsabbagh, Langendoerfer)@ihp-mi... |
Cyber_security_in_industrial_control_systems_Analysis_of_DoS_attacks_against_PLCs_and_the_insider_effect.txt | Industrial Control Systems (ICS) are vital for countries smart grids and critical infrastructures. In addition to the advantages such as controlling and monitoring geographically distributed structures, increasing productivity and efficiency, ICS have brought some security problems. Specific solutions are needed to be... | 978-1-5386-4478-2/18/$31.00 2018 IEEE Cyber Security in Industrial Control Systems: Analysis of DoS Attacks against PLCs and the Insider Effect Ercan Nurcan Ylmaz, B nyamin Ciylan Gazi University, Faculty of Technology, Ankara, Turkey Serkan G nen Gazi University, Institute of Natural and Applied Sciences, Ankara Turk... |
Formal_Modeling_of_Function_Block_Applications_Running_in_IEC_61499_Execution_Runtime.txt | "The execution model in a new standard for dis- tributed control systems, IEC 61499, is analyzed. It(...TRUNCATED) | "Formal Modeling of Function Block Applications Running in IEC 61499 Execution Runtime Goran Cengi (...TRUNCATED) |
IIoT_Cybersecurity_Risk_Modeling_for_SCADA_Systems.txt | "Urban critical infrastructure such as electric grids, water networks, and transportation systems ar(...TRUNCATED) | "4486 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 6, DECEMBER 2018 IIoT Cybersecurity Risk Modeling(...TRUNCATED) |
"Fool_Your_Enemies_Enable_Cyber_Deception_and_Moving_Target_Defense_for_Intrusion_Detection_in_SDN.t(...TRUNCATED) | "The adoption of deception technology constructed to throw off stealthy attackers from real assets a(...TRUNCATED) | "Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN (...TRUNCATED) |
Anomaly_Detection_in_Real-Time_Multi-Threaded_Processes_Using_Hardware_Performance_Counters.txt | "We propose a novel methodology for real-time monitoring of software running on embedded processors (...TRUNCATED) | "666 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020 Anomaly Detection in Rea(...TRUNCATED) |
OpenPLC_An_open_source_alternative_to_automation.txt | "Companies are always looking for ways to increase production. The elevated consumerism pushes facto(...TRUNCATED) | "OpenPLC: An Open Source Alternative to Automation Thiago Rodrigues Alves, Mario Buratto, Flavio Mau(...TRUNCATED) |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 12