Post-exploitation and Persistence Techniques Against Programmable Logic Controller
暂无分享,去创建一个
[1] Jairo Giraldo,et al. Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems , 2019, ACNS.
[2] Michail Maniatakos,et al. ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries , 2018, NDSS.
[3] Jianying Zhou,et al. Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems , 2018, ACSAC.
[4] Jianying Zhou,et al. ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus , 2018, ARES.
[5] Jianying Zhou,et al. NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems , 2018, AsiaCCS.
[6] Binbin Chen,et al. On Practical Threat Scenario Testing in an Electric Power ICS Testbed , 2018, CPSS@AsiaCCS.
[7] Nils Ole Tippenhauer,et al. On Ladder Logic Bombs in Industrial Control Systems , 2017, CyberICPS/SECPRE@ESORICS.
[8] Osama A. Mohammed,et al. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit , 2017, NDSS.
[9] Saman A. Zonouz,et al. Detecting Industrial Control Malware Using Automated PLC Code Analytics , 2014, IEEE Security & Privacy.
[10] Saman A. Zonouz,et al. A Trusted Safety Verifier for Process Controller Code , 2014, NDSS.
[11] Patrick D. McDaniel,et al. Programmable Logic Controllers , 2012 .
[12] Moses Schwartz,et al. Analysis of Field Devices Used in Industrial Control Systems , 2012, Critical Infrastructure Protection.
[13] Sharon Weinberger,et al. Computer security: Is this the start of cyberwarfare? , 2011, Nature.