filename stringlengths 34 130 | summary stringlengths 470 109k | body stringlengths 254 172k |
|---|---|---|
Attacking_SCADA_systems_A_practical_perspective.pdf | As Supervisory Control and Data Acquisition (SCADA) and Industrial and Automation Control System (IACS) architectures became more open and interconnected, some of their remotely controlled processes also became more exposed to cyber threats. Aspects such as the use of mature technologies and legacy equipment or even th... | Attacking SCADA systems: a practical perspective Lu s Rosa1, Tiago Cruz1, Paulo Sim es1, Edmundo Monteiro1, Leonid Lev2 1CISUC-DEI, University of Coimbra, Portugal 2IEC Israel Electric Corportation, Israel {lmrosa, tjcruz, psimoes, edmundo}@dei.uc.pt, leonid.lev@iec.co.il Keywords Industrial Control Systems, SCADA, S... |
PLC_Code-Level_Vulnerabilities.pdf | C ode vulnerabilities in the ladder logic of PLCs (Programmable Logic Controllers) have not been sufficiently addressed in the literature. Most of the research related to PLC threats or attacks focuses on the hardware portion of ICS (Industrial Control Systems) or SCADA (Supervisory Control and Data Acquisition) system... | PLC Code-Level Vulnerabilities Abraham Serhane1, 2, Mohamad Raad1 1International University of Beirut 146404 Mazraa, Beirut, Lebanon Email: as254@uowmail.edu.au Raad Raad2, Willy Susilo2 2University of Wollongong, Northfields Ave, Wollongong NSW 2522, Australia Index Terms DoS: Denial of Service, HMI: Human Machine I... |
Applying_static_code_analysis_on_industrial_controller_code.pdf | Static code analysis techniques are a well- established tool to improve the e ciency of software developers and for checking the correctness of safety-critical software com- ponents. However , their use is often limited to general purpose or mainstream programming languages. For these languages, static code analysis ... | Applying Static Code Analysis on Industrial Controller Code Stefan Stattelmann , Sebastian Biallas , Bastian Schlich , and Stefan Kowalewski ABB Corporate Research Germany, Ladenburg, Germany Email: rstname.lastname@de.abb.com Embedded Software Laboratory, RWTH Aachen University, Aachen, Germany Email: lastname@emb... |
Applying_Model_Checking_to_Industrial-Sized_PLC_Programs.pdf | Programmable logic controllers (PLCs) are embed- ded computers widely used in industrial control systems. Ensuringthat a PLC software complies with its speci cation is a challeng-ing task. Formal veri cation has become a recommended practiceto ensure the correctness of safety-critical software, but is stillunderused in... | 1400 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 11, NO. 6, DECEMBER 2015 Applying Model Checking to Industrial-Sized PLC Programs Borja Fern ndez Adiego, D niel Darvas, Enrique Blanco Vi uela, Jean-Charles Tournier, Member , IEEE , Simon Bliudze, Jan Olaf Blech, Member , IEEE , and V ctor Manuel Gonz lez Su rez |
Research_Trends_Challenges_and_Emerging_Topics_in_Digital_Forensics_A_Review_of_Reviews.pdf | Due to its critical role in cybersecurity, digital forensics has received signi cant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date,... | Received January 22, 2022, accepted February 16, 2022, date of publication February 24, 2022, date of current version March 10, 2022. Digital Object Identifier 10.1 109/ACCESS.2022.3154059 Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews FRAN CASINO 1,2, (Member, IEEE), THOMAS ... |
Security_Challenges_in_Control_Network_Protocols_A_Survey.pdf | With the ongoing adoption of remotely communicating and interacting control systems harboredby critical infrastructures, the potential attack surface of suchsystems also increases drastically. Therefore, not only the needfor standardized and manufacturer-agnostic control systemcommunication protocols has grown, but als... | IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 21, NO. 1, FIRST QUARTER 2019 619 Security Challenges in Control Network Protocols: A Survey Anna V olkova , Michael Niedermeier , Robert Basmadjian , and Hermann de Meer Index Terms Control systems, network protocols, network security. I. I NTRODUCTION :CONTROL NETWORKS I... |
On_Experimental_validation_of_Whitelist_Auto-Generation_Method_for_Secured_Programmable_Logic_Controllers.pdf | This paper considers a whitelisting system for programmable logic controllers (PLCs). In control systems, controllers are final fortresses to continues the operation of field devices (actuators/sensors), but they are fragile with respect to malware and zero-day attacks. One of the countermeasures applicable for control... | On Experimental validation of Whitelist Auto- Generation Method for Secured Programmable Logic Controllers Shintaro Fujita Dept. of Mechanical Engineering and Intelligent Systems University of Electro-Communications Tokyo, Japan shntr.fujita@uec.ac.jp Kenji Sawada Info-Powerd Energy System Research Center University of... |
Formalization_and_Verification_of_PLC_Timers_in_Coq.pdf | Programmable logic controllers (PLCs) are widely used in embedded systems. A timer plays a pivotal role in PLC real-time applications. The paper presents a formalization of TON-timers of PLC programs in the theorem proving system Coq. The behavior of a timer is characterized by a set of axioms at an abstract level. PLC... | Formalization and Veri cation of PLC Timers in Coq Hai Wan Key Lab for ISS of MOE, Tsinghua National Laboratory for Information Science and Technology, School of Software, Tsinghua University, Beijing, China Email: wanh03 @mails.tsinghua.edu.cnGang Chen Lingcore Laboratory Portland, USA Email: gangchensh @gmail.comXiao... |
Towards_Automated_Safety_Vetting_of_PLC_Code_in_Real-World_Plants.pdf | Safety violations in programmable logic controllers (PLCs), caused either by faults or attacks, have recently garnered signi cant attention. However, prior efforts at PLC code vetting suffer from many drawbacks. Static analyses and veri cation cause signi cant false positives and cannot reveal speci c runtime contexts.... | Towards Automated Safety Vetting of PLC Code in Real-World Plants Mu Zhang , Chien-Ying Chen , Bin-Chou Kao , Yassine Qamsane , Yuru Shao , Yikai Lin , Elaine Shi , Sibin Mohan , Kira Barton , James Moyne and Z. Morley Mao Department of Computer Science, Cornell University Department of Computer Science, University ... |
An_Enhanced_Multi-Stage_Semantic_Attack_Against_Industrial_Control_Systems.pdf | Industrial Control Systems (ICS) play a very important role in national critical infrastructures. However, the growing interaction between the modern ICS and the Internet has made ICS more vulnerable to cyber attacks. In order to protect ICS from malicious attacks, intrusion detection technology emerges. By analyzing t... | SPECIAL SECTION ON DISTRIBUTED COMPUTING INFRASTRUCTURE FOR CYBER-PHYSICAL SYSTEMS Received September 29, 2019, accepted October 21, 2019, date of publication October 25, 2019, date of current version November 7, 2019. Digital Object Identifier 10.1 109/ACCESS.2019.2949645 An Enhanced Multi-Stage Semantic Attack Agains... |
Methods_for_Reliable_Simulation-Based_PLC_Code_Verification.pdf | Simulation-based programmable logic controller (PLC) code veri cation is a part of virtual commissioning, wherethe control code is veri ed against a virtual prototype of an appli-cation. With today s general OPC interface, it is easy to connect aPLC to a simulation tool for, e.g., veri cation purposes. However,there ar... | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 2, MAY 2012 267 Methods for Reliable Simulation-Based PLC Code Veri cation Henrik Carlsson, Bo Svensson, Fredrik Danielsson, and Bengt Lennartson , Member, IEEE Index Terms Industrial control system, programmable logic controller (PLC), simulation, simulation-ba... |
A_Cyber-Security_Methodology_for_a_Cyber-Physical_Industrial_Control_System_Testbed.pdf | Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of malicious cyber attacks. Towards this end, developing a testbed to ge... | Received January 6, 2021, accepted January 15, 2021, date of publication January 20, 2021, date of current version January 28, 2021. Digital Object Identifier 10.1 109/ACCESS.2021.3053135 A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed MOHAMMAD NOORIZADEH 1, MOHAMMAD SHAKERPOUR 2, NA... |
Encryption_in_ICS_networks_A_blessing_or_a_curse.pdf | Nowadays, the internal network communication of Industrial Control Systems (ICS) usually takes place in unencrypted form. This, however , seems to be bound to change in the future: as we write, encryption of network traf c isseriously being considered as a standard for future ICS. In this paper we take a critical look ... | Encryption in ICS networks: a Blessing or a Curse? Davide Fauri1, Bart de Wijs2, Jerry den Hartog1, Elisa Costante3, Emmanuele Zambon3and Sandro Etalle1,3 1Technische Universiteit Eindhoven {d.fauri,j.d.hartog,s.etalle }@tue.nl2ABB Group bart.wijs@nl.abb.com3SecurityMatters elisa.costante@secmatters.com emmanuele.zambo... |
Construction_of_false_sequence_attack_against_PLC_based_power_control_system.pdf | It is essential to ensure accurate sensor measurements to safely regulate physical process in power control system. Traditional false data injection (FDI) attacks against control system mainly require the attackers to obtain the optimal maliciousinputs. Different from the traditional FDI attacks, we present false seque... | Construction of False Sequence Attack Against PLC based Power Control System Min Xiao, Jing Wu , Chengnian Long, Shaoyuan Li Department of Automation, Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing, Ministry of Education, Shanghai 200240, P . R. China E-mail: jingwu@sjtu.e... |
Virtualizing_Programmable_Logic_Controllers_Toward_a_Convergent_Approach.pdf | Modern programmable logic controllers (PLCs) are pervasive components in industrial control systems (ICSs) suchas supervisory control and data acquisition, designed to controlindustrial processes autonomously or as part of a distributedsystem topology. Its success may be explained by its robustnessand reliability, bein... | IEEE EMBEDDED SYSTEMS LETTERS, VOL. 8, NO. 4, DECEMBER 2016 69 Virtualizing Programmable Logic Controllers: Toward a Convergent Approach Tiago Cruz, Paulo Sim es, and Edmundo Monteiro Index Terms Converged infrastructures, industrial control systems (ICS), virtualization. I. I NTRODUCTION IN RECENT years, supervisory ... |
No_Need_to_be_Online_to_Attack_-_Exploiting_S7-1500_PLCs_by_Time-Of-Day_Block.pdf | In this paper, we take the attack approach intro- duced in our previous work [8] one more step in the direction of exploiting PLCs of ine, and extend our experiments to cover the latest and most secured Siemens PLCs line i.e. S7-1500 CPUs. The attack scenario conducted in this work aims at confusing the behavior of the... | 978-1-6654-6692-9/22/$31.00 2022 IEEENo Need to be Online to Attack - Exploiting S7-1500 PLCs by Time-Of-Day Block Wael Alsabbagh1,2and Peter Langend rfer1,2 1IHP Leibniz-Institut f r innovative Mikroelektronik, Frankfurt (Oder), Germany 2Brandenburg University of Technology Cottbus-Senftenberg, Cottbus, Germany E-m... |
Detecting_PLC_control_corruption_via_on-device_runtime_verification.pdf | With an increased emphasis on the cyber-physical security of safety-critical industrial control systems, pro- grammable logic controllers have been targeted by both secu- rity researchers and attackers as critical assets. Security and veri cation solutions have been proposed and/or implemented either externally or with... | Detecting PLC Control Corruption via On-Device Runtime Veri cation Luis Garcia, Saman Zonouz Department of Electrical & Computer Engineering Rutgers University Piscataway, New Jersey 08854 fl.garcia2, saman.zonouz g@rutgers.eduDong Wei, Leandro P eger de Aguiar Siemens Corporation, Corporate Technology Princeton, New J... |
A_Stealthy_False_Command_Injection_Attack_on_Modbus_based_SCADA_Systems.pdf | Modbus is a widely-used industrial protocol in Supervisory Control and Data Acquisition (SCADA) systems for different purposes such as controlling remote devices, monitoring physical processes, data acquisition, etc. Unfortunately, such a protocol lacks security means i.e., authentication, integrity, and con dentiality... | A Stealthy False Command Injection Attack on Modbus based SCADA Systems Wael Alsabbagh1,2, Samuel Amogbonjaye2, Diego Urrego2and Peter Langend rfer1,2 1IHP Leibniz-Institut f r innovative Mikroelektronik, Frankfurt (Oder), Germany 2Brandenburg University of Technology Cottbus-Senftenberg, Cottbus, Germany {Alsabbagh,... |
Fake_PLC_in_the_Cloud_We_Thought_the_Attackers_Believed_that_How_ICS_Honeypot_Deception_Gets_Impacted_by_Cloud_Deployments.pdf | The Industrial Control System (ICS) industry faces an ever-growing number of cyber threats defence against which can be strengthened using honeypots. As the systems they mimic, ICS honeypots shall be deployed in a similar context to field ICS systems. This ICS context demands a novel honeypot deployment process, that... | Fake PLC in the cloud, we thought the attackers believed that: How ICS honeypot deception gets impacted by cloud deployments? Stanislava Ivanova , Naghmeh Moradpoor School of Computing, Engineering and the Built Environment Edinburgh Napier University Edinburgh, UK 40454292@live.napier.ac.uk , n.moradpoor@napier.ac.uk ... |
OpenPLC_An_open_source_alternative_to_automation.pdf | Companies are always looking for ways to increase production. The elevated consumerism pushes factories to produce more in less time. Industry automation came as the solution to increase quality, production and decrease costs. Since the early 70s, PLC (Pro grammable Logic Controller) has dominated industrial automation... | OpenPLC: An Open Source Alternative to Automation Thiago Rodrigues Alves, Mario Buratto, Flavio Mauricio de Souza , Thelma Virginia Rodrigues Departamento de Engenharia Eletr nica e de Telecomunica es PUC Minas Belo Horizonte, Brazil thiagoralves@gmail.com Keywords PLC; OpenPLC; Automation; MODBUS; Open source I. INTR... |
The_Cybersecurity_Landscape_in_Industrial_Control_Systems.pdf | |Industrial control systems (ICSs) are transition- ing from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based sys-tems creating a close coupling between cyber and physicalcomponents. In this paper, we explore the ICS cybersecuritylandscape including: 1) the key princi... | CONTRIBUTED PAPER The Cybersecurity Landscape in Industrial Control Systems This paper surveys the state of the art in industrial control system (ICS) security, identifies outstanding research challenges in this emerging area, and explains the key concepts and principles for deployment of cybersecurity methods and tool... |
Formal_Modeling_of_Function_Block_Applications_Running_in_IEC_61499_Execution_Runtime.pdf | The execution model in a new standard for dis- tributed control systems, IEC 61499, is analyzed. It is shown how the same standard compliant application running in two different standard compliant runtime environments may result in completely different behaviors. Thus, to achieve true portabilityof applications between... | Formal Modeling of Function Block Applications Running in IEC 61499 Execution Runtime Goran Cengi c and Oscar Ljungkrantz and Knut Akesson {cengic, oscar.ljungkrantz, knut }@chalmers.se Department of Signals and Systems Chalmers University of Technology Sweden |
Investigating_the_impact_of_cyber_attacks_on_power_system_reliability.pdf | As power grids rely more on the open communication technologies and supervisory control and data acquisition (SCADA) system, they are becoming more vulnerable to malicious cyber attacks. The reliability of the power system can be impacted by the SCADA system due to a diverse set of probable cyber attacks on it. This pa... | Investigating the Impact of Cyber Attacks on Power System Reliability *Yichi Zhang, *Lingfeng Wang, and Weiqing Sun *Department of Electrical Engi neering and Computer Science Department of Engineering Technology The University of Toledo Toledo, Ohio 43606, USA Email: lingfeng.wang@utoledo.edu Keywords power system ... |
Construction_and_verification_of_PLC_programs_by_LTL_specification.pdf | The article proposes an approach to construction and verification of PLC ST-programs for discrete problems. The linear-time temporal logic LTL is used for the specification of the program behavior. Programming is carried out in the ST (Structured Text) language, according to the LTL-specification. The correctness analy... | Construction and Verification of PLC Programs by LTL Specification E.V. Kuzmin Yaroslavl State University Yaroslavl, Russia Email: kuzmin@uniyar.ac.ru A.A. Shipov Yaroslavl State University Yaroslavl, Russia D.A. Ryabukhin Yaroslavl State University Yaroslavl, Russia Email: dmitry_ryabukhin@mail.ru Email: ash@yma.ac.ru... |
Detecting_anomalous_behavior_of_PLC_using_semi-supervised_machine_learning.pdf | Industrial Control System (ICS) is used to monitor and control critical infrastructures. Programmable logic controllers (PLCs) are major components of ICS, which are used to form automation system. It is important to protect PLCs from any attacks and undesired incidents. However, it is not easy to apply traditional too... | Detecting Anomalous Behavior of PLC using Semi- supervised Machine Learning Ken Yau, KP Chow, SM Yiu, CF Chan Department of Computer Science The University of Hong Kong Hong Kong, China {kkyau, chow, smyiu, cfchan}@cs.hku.hk Keywords Programming logic controller, forensics, machine learning I. INTRODUCTION Industrial ... |
Learning-Based_Time_Delay_Attack_Characterization_for_Cyber-Physical_Systems.pdf | The cyber-physical systems (CPSes) rely on com- puting and control techniques to achieve system safety and reliability. However, recent attacks show that these techniques are vulnerable once the cyber-attackers have bypassed air gaps. The attacks may cause service disruptions or even physical damages. This paper design... | Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems Xin Lou, Cuong Tranz, David K.Y. Yauz, Rui Tany, Hongwei Ngx, Tom Zhengjia Fu, Marianne Winslettx Advanced Digital Sciences Center, Illinois at SingaporeyNanyang Technological University, Singapore zSingapore University of Technology and De... |
CyberPhysical_System_Security_for_the_Electric_Power_Grid.pdf | |The development of a trustworthy smart grid requires a deeper understanding of potential impacts resulting from successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid s dependency on itscyber infrastructure and its ability to tolerate potential failures.A further exploration of ... | INVITED PAPER Cyber Physical System Security for the Electric Power Grid Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabiliti es, potential impact of disturbances, and several mitigations. BySiddharth Sridhar, Student Member IEEE ,Adam Hahn, St... |
Arcade.PLC_a_verification_platform_for_programmable_logic_controllers.pdf | This paper introduces Arcade.PLC , a veri cation platform for programmable logic controllers (PLCs). The tool supports static analysis as well as CTL and past-time LTL model checking using counterexample-guided abstraction re nement for di erent programming languages used in industry. In the underlying principles of t... | Arcade.PLC: A Veri cation Platform for Programmable Logic Controllers Sebastian Biallas Embedded Software Laboratory RWTH Aachen University Aachen, Germany biallas@embedded.rwth- aachen.deJ rg Brauer Veri ed Systems International GmbH Bremen, Germany brauer@veri ed.deStefan Kowalewski Embedded Software Laboratory RWTH ... |
Model_Checking_PLC_Software_Written_in_Function_Block_Diagram.pdf | The development of Programmable Logic Con- trollers (PLCs) in the last years has made it possible to apply them in ever more complex tasks. Many systems based on these controllers are safety-critical, the certi cation of which entails a great effort. Therefore, there is a big demand for tools for analyzing and verifyin... | Model Checking PLC Software Written in Function Block Diagram Olivera Pavlovi c Siemens Mobility Division Braunschweig, Germany Email: olivera.pavlovic.ext@siemens.comHans-Dieter Ehrich Technische Universit at Braunschweig Braunschweig, Germany Email: hd.ehrich@tu-bs.de Keywords -formal veri cation; model checking; P... |
A_technique_for_bytecode_decompilation_of_PLC_program.pdf | Program logical controllers (PLCs) are the kernel equipment of industrial control system (ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber threats, which may lead to significant consequences due to its inherent characteristics. In IT system, decompilation is ... | A Technique for Bytecode Decompilation of PLC Program Xuefeng LV, Yaobin Xie, Xiaodong Zhu, Lu Ren State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China lvxuefeng10@163.com, yb_xie@163.com, Zhuxd11@qq.com, 515927313@qq.com Keywords programmable logical controller; bytecode; decompila... |
SCADA_honeypots_An_in-depth_analysis_of_Conpot.pdf | Supervisory Control and Data Acquisition (SCADA) honeypots are key tools not only for determining threats which pertain to SCADA devi ces in the wild, but also for early detection of potential mali cious tampering within a SCADA device network. An analysis of one such SCADA honeypot, Conpot, is conducted to determine i... | SCADA Honeypots An In-depth Analysis of Conpot Arthur Jicha, Mark Patton, and Hsinchun Chen University of Arizona Department of Management Information Systems Tucson, AZ 85721, USA ajicha@email.arizona.edu, mpatton@ema il.arizona.edu, hchen@eller.arizona.edu Keywords Supervisory Control and Data Acquisition systems, ho... |
Efficient_representation_for_formal_verification_of_PLC_programs.pdf | This paper addresses scalability of model-checking using the NuSMV model-checker . T o avoid or at least limit combinatory explosion, an ef cient representation of PLC programs is proposed. This representation includes only thestates that are meaningful for properties proof. A method to translate PLC programs developed... | Ef cient representation for formal veri cation of PLC programs * Vincent Gourcuff, Olivier De Smet and Jean-Marc Faure LURPA ENS de Cachan, 61 avenue du Pr es. Wilson, F-94235 Cachan Cedex, France Email: {gourcuff, de smet, faure }@lurpa.ens-cachan.fr |
Fool_Your_Enemies_Enable_Cyber_Deception_and_Moving_Target_Defense_for_Intrusion_Detection_in_SDN.pdf | The adoption of deception technology constructed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the network system. Also, some static honeypots are deployed in the network system to attract adversaries for avoiding them accessing the real targets. Th... | Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN Phan The Duya,b, Hien Do Hoanga,b, Nghi Hoang Khoaa,b, Do Thi Thu Hiena,b, Van-Hau Phama,b aInformation Security Laboratory, University of Information Technology , Hochiminh City, Vietnam bVietnam National University Ho C... |
Design_lifecycle_for_secure_cyber-physical_systems_based_on_embedded_devices.pdf | The paper is devoted to the issues of design of secure cyber-physical systems based on embedded devices. It aims to develop a generaliz ed approach to the design of secure systems based on embedded devices. Current approaches to design secure software and embedded devices are analyzed. The design lifecycle for secure e... | The 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 21-23 September, 2017, Bucharest, Romania Design Lifecycle for Secure Cyber-Physical Systems based on Embedded Devices Dmitry Levshun, Andrey Chechulin, and Igor Kotenko St. Petersburg Insti... |
Detecting_Payload_Attacks_on_Programmable_Logic_Controllers_PLCs.pdf | Programmable logic controllers (PLCs) play criti- cal roles in industrial control systems (ICS). Providing hardware peripherals and rmware support for control programs (i.e., a PLC s payload ) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attac... | Detecting Payload Attacks on Programmable Logic Controllers (PLCs) Huan Yang, Liang Chengy, and Mooi Choo Chuahz Department of Computer Science and Engineering, Lehigh University, Bethlehem, Pennsylvania 18015 E-mail:huy213@lehigh.edu,ycheng@cse.lehigh.edu,zchuah@cse.lehigh.edu |
Internet-facing_PLCs_as_a_network_backdoor.pdf | Industrial control systems (ICS) are integral com ponents of production and control processes. Our modern infras tructure heavily relies on them. Unfortunately, from a security perspective, thousands of PLCs are deployed in an Internet-facing fashion. Security features are largely absent in PLCs. If they are present ... | 1 st Workshop on Security and Privacy in Cybermatics (SPiCy 2015) Internet-facing PLCs as a Network Backdoor Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth Freie Universitat Berlin -Secure Identity Research Group <first name>.<lastname> @fu-berlin.de |
Formal_Modelling_of_PLC_Systems_by_BIP_Components.pdf | Programable logic controllers (PLCs) are complex embedded systems which are widely used in industry. The formal modeling of PLC system for veri cation is a rough task. Good veri cation model should be faithful with the system, and also should have suitable scale because of the state explosion problem of veri cation. Th... | Formal Modelling of PLC Systems By BIP Components Rui Wang, Yong Guan, Liming Luo College of Information Engineering, Capital Normal University, Beijing, ChinaJie Zhang College of Information Science and Technology, Beijing University of Chemical Technology, Beijing, China Xiaoyu Song ECE Dept, Portland State Universit... |
A_Formal_Semantics_of_PLC_Programs_in_Coq.pdf | Programmable logic Controllers (PLC) are embedded systems that are widely used in industry. We propose a formal semantics of the Instruction List (IL) language, one of the ve programing languages de ned in the IEC 61131-3 standard for PLC programing. This semantics support a signi cant subset of the IL language that i... | A formal semantics of PLC programs in Coq Sidi OULD BIHA FORMES project, INRIA and Tsinghua University Beijing, China Sidi.Ould Biha@inria.fr I. Introduction Programmable Logical Controllers (PLC) are micro-processor based control systems. They are used in a wide range of industrial applications, from automotive indust... |
PLC_access_control_a_security_analysis.pdf | A Programmable Logic Controller (PLC) is a very common industrial control system device used to control output devices based on data received (and processed) from input devices. Given the central role that PLCs play in deployed industrial control systems, it has been a preferred target of ICS attackers. A quick search ... | PLC Access Control: A Security Analysis Haroon Wardak Information and Computer Science Department KFUPM, Dhahran, 31261, KSA Email: g201302150@kfupm.edu.saSami Zhioua Information and Computer Science Department KFUPM, Dhahran, 31261, KSA Email: zhioua@kfupm.edu.saAhmad Almulhem Computer Engineering Department KFUPM, Dh... |
Cyber_security_in_industrial_control_systems_Analysis_of_DoS_attacks_against_PLCs_and_the_insider_effect.pdf | Industrial Control Systems (ICS) are vital for countries smart grids and critical infrastructures. In addition to the advantages such as controlling and monitoring geographically distributed structures, increasing productivity and efficiency, ICS have brought some security problems. Specific solutions are needed to be... | 978-1-5386-4478-2/18/$31.00 2018 IEEE Cyber Security in Industrial Control Systems: Analysis of DoS Attacks against PLCs and the Insider Effect Ercan Nurcan Ylmaz, B nyamin Ciylan Gazi University, Faculty of Technology, Ankara, Turkey Serkan G nen Gazi University, Institute of Natural and Applied Sciences, Ankara Turk... |
A_hierarchy_framework_on_compositional_verification_for_PLC_software.pdf | The correctness verification of embedded control software has become an importan t research topic in embedded system field. The paper analys es the pres ent situation on correctness verification of control software as well as the limitations of existing technologies. In order to the high reliability and high security r... | A Hierarchy Framework on Compositional Verification for PLC Software Litian Xiao1,2 and Mengyuan Li 1Beijing Special Engineering Design and Research Institute Beijing 100028, China {xiao_litian & li_mengyuan2000}@sina.com Ming Gu and Jiaguang Sun 2 School of Softw are, TNList, KLISS Tsinghua University Beijing 100084, ... |
SoK_Attacks_on_Industrial_Control_Logic_and_Formal_Verification-Based_Defenses.pdf | Programmable Logic Controllers (PLCs) play a critical role in the industrial control systems. Vulnerabilities in PLC programs might lead to attacks causing devastatingconsequences to the critical infrastructure, as shown inStuxnet and similar attacks. In recent years, we have seenan exponential increase in vulnerabilit... | SoK: Attacks on Industrial Control Logic and Formal Veri cation-Based Defenses Ruimin Sun Northeastern University r .sun@northeastern.eduAlejandro Mera Northeastern University mera.a@northeastern.eduLong Lu Northeastern University l.lu@northeastern.eduDavid Choffnes Northeastern University choffnes@ccs.neu.edu Index Te... |
KST_Executable_Formal_Semantics_of_IEC_61131-3_Structured_Text_for_Verification.pdf | Programmable logic controllers (PLCs) are special purpose computers designed to perform industrial automation tasks. They require highly reliable control programs, particularly when used in safety- critical systems such as nuclear power stations. In the development of reliable control programs, formal methods are ``hig... | Received December 19, 2018, accepted January 10, 2019, date of publication January 21, 2019, date of current version February 8, 2019. Digital Object Identifier 10.1 109/ACCESS.2019.2894026 KST: Executable Formal Semantics of IEC 61131-3 Structured Text for Verification YANHONG HUANG 1, XIANGXING BU2, GANG ZHU2, XIN YE... |
On_experimental_verification_of_model_based_white_list_for_PLC_anomaly_detection.pdf | Rece ntly, defensive countermeasures of controller are important because cyber -attacks on the control system are growing highly . This paper propose s an anomaly detection method of white list using PLC (Programmable Logic Controller ) as one of the countermeasures of controller. This paper introduces a white list des... | 1 I. INTRODUCTION Recently, industrial control system s (ICSs) connect to the internet , PLC (Programmable Logic Controller ) is becoming network communication device introduces [1]. Accordingly , a number of the security incident s such as cyber - and virus -attacks have been reported so far [2][3] . Therefore, it is ... |
Formal_Methods_for_Industrial_Interlocking_Verification.pdf | In this paper, we present an overview of research jointly undertaken by the Swansea Railway Veri cation Group towards veri cation techniques for automatically checking safety for train control systems. We present a comprehensive modelling of safety principles in rst order logic. We conclude by applying veri cation met... | Formal Methods for Industrial Interlocking Veri cation Simon Chadwick Siemens Rail Automation UK Chippenham, UK Simon.Chadwick@siemens.comPhillip James Computer Science Swansea University Swansea, UK P.D.James@swansea.ac.ukMarkus Roggenbach Computer Science Swansea University Swansea, UK M.Roggenbach@swansea.ac.ukTom W... |
Multicrane_Visual_Sorting_System_Based_on_Deep_Learning_With_Virtualized_Programmable_Logic_Controllers_in_Industrial_Internet.pdf | We develop a deep-learning-based multicrane visual sorting system with virtualized programmable logiccontrollers (PLCs) in intelligent manufacturing, which en-ables the accurate location and suction of the materialson the conveyor belt. First, virtualized PLCs are deployedin the eld and the cloud to break data islands... | 3726 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 20, NO. 3, MARCH 2024 Multicrane Visual Sorting System Based on Deep Learning With Virtualized Programmable Logic Controllers in Industrial Internet Meixia Fu , Zhenqian Wang , Jianquan Wang, Qu Wang , Zhangchao Ma , and Danshi Wang , Senior Member, IEEE Index Term... |
Moving_Target_Defense_for_CyberPhysical_Systems_Using_IoT-Enabled_Data_Replication.pdf | This article proposes a novel moving target defense (MTD) strategy that leverages the versatility of the Internetof Things (IoT) networks to enhance the security of cyber physical systems (CPSs) by replicating relevant sensory andcontrol signals. The replicated data are randomly selected andtransmitted to create two la... | IEEE INTERNET OF THINGS JOURNAL, VOL. 9, NO. 15, 1 AUGUST 2022 13223 Moving Target Defense for Cyber Physical Systems Using IoT-Enabled Data Replication Jairo A. Giraldo ,Member, IEEE , Mohamad El Hariri ,Member, IEEE , and Masood Parvania ,Senior Member, IEEE Index Terms Cyber physical systems, cybersecurity, data re... |
A_New_Injection_Threat_on_S7-1500_PLCs_-_Disrupting_the_Physical_Process_Offline.pdf | Programmable Logic Controllers (PLCs) are increasingly connected and integrated into the Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined control process. But in fact, this brings also its security challenges and exposes them to various cyber-attacks targeting the physical p... | Received 6 December 2021; revised 22 January 2022; accepted 6 February 2022. Date of publication 14 February 2022; date of current version 2 March 2022. The review of this paper was arranged by Associate Editor Yang Shi. Digital Object Identi er 10.1109/OJIES.2022.3151528 A New Injection Threat on S7-1500 PLCs - Disrup... |
FedTIU_Securing_Virtualized_PLCs_Against_DDoS_Attacks_Using_a_Federated_Learning_Enabled_Threat_Intelligence_Unit.pdf | Conventional Programmable Logic Controller (PLC) systems are becoming increasingly challenging to manage due to hardware and software dependencies. Moreover, the number and size of conventional PLCs on factory oors continue to increase, and virtualized PLC (vPLC) offers a solution to address these challenges. The util... | FedTIU: Securing Virtualized PLCs Against DDoS Attacks Using a Federated Learning Enabled Threat Intelligence Unit Priyanka V erma1, Miguel Ponce De Leon2, John G. Breslin1, Donna O Shea3 1Data Science Institute, University of Galway, Ireland, { rstname.lastname }@universityofgalway.ie 2VMware Research, VMware, Cork, I... |
Potential_of_Edge_Computing_PLCs_in_Industrial_Automation.pdf | Ongoing industrial revolution Industry 4.0, driven by a mesh of disruptive new technologies, promises a more effective and productive industrial environment. The challenges that have arisen as a side effect, such as the vast quality of data that needs to be transmitted and processed safely in real-time, require a new... | 21st International Symposium INFOTEH-JAHORINA, 16-18 March 2022 978-1-6654-3778-3/22/$31.00 2022 IEEE In d u s tr y 4 .0S y s te m I n te g r a tio n A u g m e n te d r e a lityM a c h in e le a r n in g S im u la tio n s A d d itiv e M a n u fa c tu r in gB ig D a ta A u to n o m o u s R o b o ts C y b e r s e c u r ... |
PLC_security_and_critical_infrastructure_protection.pdf | Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of ef ciency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. There... | PLC Security and Critical Infrastructure Protection G. P. H. Sandaruwan, P. S. Ranaweera, and Vladimir A. Oleshchuk Keywords: PLC vulnerabilities, PLC security, critical infrastructure protection I. I NTRODUCTION Industrial automation is one of the most popular terms that have been discussed over the past decade. Autom... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.