ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS
暂无分享,去创建一个
[1] Huaqun Guo,et al. An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[2] Luying Zhou,et al. Applying NFV/SDN in mitigating DDoS attacks , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.
[3] Nils Ole Tippenhauer,et al. Legacy-Compliant Data Authentication for Industrial Control System Traffic , 2017, ACNS.
[4] Alessandro Armando,et al. Selective Release of Smart Metering Data in Multi-domain Smart Grids , 2014, SmartGridSec.
[5] Luying Zhou,et al. Mind the Gap: Security Analysis of Metro Platform Screen Door System , 2017, SG-CRC.
[6] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[7] Huaqun Guo,et al. Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS , 2018, ArXiv.
[8] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[9] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Jiming Chen,et al. Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.
[11] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[12] Luying Zhou,et al. A fog computing based approach to DDoS mitigation in IIoT systems , 2019, Comput. Secur..
[13] Avishai Wool,et al. Stealthy Deception Attacks Against SCADA Systems , 2017, CyberICPS/SECPRE@ESORICS.
[14] Mathias Payer,et al. CUP: Comprehensive User-Space Protection for C/C++ , 2017, AsiaCCS.
[15] Huaqun Guo,et al. Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems , 2018, ESSoS.
[16] Bünyamin Ciylan,et al. Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect , 2018, 2018 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG).
[17] Georg Carle,et al. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.
[18] Daniel T Sullivan,et al. Components of Industrial Control Systems , 2016 .
[19] Stéphane Lafortune,et al. Stealthy deception attacks for cyber-physical systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Alexandru Stefanov,et al. SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systems , 2015 .
[22] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[23] David K. Y. Yau,et al. Enforcing Memory Safety in Cyber-Physical Systems , 2017, CyberICPS/SECPRE@ESORICS.
[24] Alessandro Armando,et al. Attribute based access control for APIs in spring security , 2014, SACMAT '14.
[25] Luying Zhou,et al. 2FA Communication Protocol to Secure Metro Control Devices , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).