Post-exploitation and Persistence Techniques Against Programmable Logic Controller

[1]  Jairo Giraldo,et al.  Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems , 2019, ACNS.

[2]  Michail Maniatakos,et al.  ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries , 2018, NDSS.

[3]  Jianying Zhou,et al.  Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems , 2018, ACSAC.

[4]  Jianying Zhou,et al.  ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus , 2018, ARES.

[5]  Jianying Zhou,et al.  NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems , 2018, AsiaCCS.

[6]  Binbin Chen,et al.  On Practical Threat Scenario Testing in an Electric Power ICS Testbed , 2018, CPSS@AsiaCCS.

[7]  Nils Ole Tippenhauer,et al.  On Ladder Logic Bombs in Industrial Control Systems , 2017, CyberICPS/SECPRE@ESORICS.

[8]  Osama A. Mohammed,et al.  Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit , 2017, NDSS.

[9]  Saman A. Zonouz,et al.  Detecting Industrial Control Malware Using Automated PLC Code Analytics , 2014, IEEE Security & Privacy.

[10]  Saman A. Zonouz,et al.  A Trusted Safety Verifier for Process Controller Code , 2014, NDSS.

[11]  Patrick D. McDaniel,et al.  Programmable Logic Controllers , 2012 .

[12]  Moses Schwartz,et al.  Analysis of Field Devices Used in Industrial Control Systems , 2012, Critical Infrastructure Protection.

[13]  Sharon Weinberger,et al.  Computer security: Is this the start of cyberwarfare? , 2011, Nature.