No abstract available.
Proceeding Downloads
A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective
Process-level detection of cyberattacks on industrial control systems pertain to observing the physical process to detect implausible behavior. State-of-the-art techniques identify a baseline of the normal process behavior from historical measurements ...
Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking
If an attacker is able to successfully subvert a device within a network, that often gives them easier access to spread the intrusion to other devices in the network. Common guidance, such as that provided in NIST SP 800-82, recommends network ...
An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850
Substation automation systems (SAS) are known to be vulnerable to cyber attacks due to the weaknesses of security features (e.g., encryption, authenticity). These issues were demonstrated by the recent Ukranian cyber attack event on 2016. The security ...
Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild
Internet connectivity of electronic devices has brought us the ease of centralized management and these days more and more devices are connected to this globally accessible network. At the same time, this landscape has opened new doors for malicious ...
A Strategy for Security Testing Industrial Firewalls
The ability to secure industrial control systems (ICS) against adversaries relies on defense in depth and implementation of security controls. However, as automation and networking of industrial processes increases, so do the opportunities for ...
If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic
In the modern world, the reliable and continuous operation of cyber-physical systems (CPSs) have become increasingly crucial factors of our daily life. As a result, the networking protocols of CPSs have been developed to achieve availability without ...
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS
Industrial control systems (ICS) have been widely adopted in mission-critical infrastructures. However, the increasing prevalence of cyberattacks targeting them has been a critical security concern. On the other hand, the high real-time and availability ...



