A brief look at the security of DeviceNet communication in industrial control systems
暂无分享,去创建一个
[1] Viktor Schiffer. Common Industrial Protocol (CIP™) and the Family of CIP Networks , 2014 .
[2] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[3] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[4] Sujeet Shenoi,et al. A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.
[5] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[6] Mark A. Gondree,et al. DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing , 2017, ICSS.
[7] Sebastian Mödersheim,et al. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures , 2012, TACAS.
[8] Robin A. Gandhi,et al. Authentication Bypass and Remote Escalated I/O Command Attacks , 2015, CISR.
[9] Alvaro A. Cárdenas,et al. Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed , 2016, SG-CRC.
[10] Bogdan Groza,et al. DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer , 2017, ARES.
[11] Bogdan Groza,et al. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks , 2018, IEEE Vehicular Technology Magazine.
[12] Mathieu Turuani,et al. The CL-Atse Protocol Analyser , 2006, RTA.
[13] Mark J. Nixon,et al. HART Device Networks , 2014 .
[14] Sujeet Shenoi,et al. Attack taxonomies for the Modbus protocols , 2008, Int. J. Crit. Infrastructure Prot..