skip to main content
10.1145/3372318acmotherconferencesBook PagePublication PagesicssConference Proceedingsconference-collections
ICSS: Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICSS: Fifth Annual Industrial Control System Security Workshop San Juan PR USA 10 December 2019
ISBN:
978-1-4503-7719-5
Published:
10 December 2019
In-Cooperation:
ACSA

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective

Process-level detection of cyberattacks on industrial control systems pertain to observing the physical process to detect implausible behavior. State-of-the-art techniques identify a baseline of the normal process behavior from historical measurements ...

research-article
Use of an SDN Switch in Support of NIST ICS Security Recommendations and Least Privilege Networking

If an attacker is able to successfully subvert a device within a network, that often gives them easier access to spread the intrusion to other devices in the network. Common guidance, such as that provided in NIST SP 800-82, recommends network ...

research-article
An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850

Substation automation systems (SAS) are known to be vulnerable to cyber attacks due to the weaknesses of security features (e.g., encryption, authenticity). These issues were demonstrated by the recent Ukranian cyber attack event on 2016. The security ...

research-article
Public Access
Gas what?: I can see your GasPots. Studying the fingerprintability of ICS honeypots in the wild

Internet connectivity of electronic devices has brought us the ease of centralized management and these days more and more devices are connected to this globally accessible network. At the same time, this landscape has opened new doors for malicious ...

research-article
A Strategy for Security Testing Industrial Firewalls

The ability to secure industrial control systems (ICS) against adversaries relies on defense in depth and implementation of security controls. However, as automation and networking of industrial processes increases, so do the opportunities for ...

research-article
Public Access
If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic

In the modern world, the reliable and continuous operation of cyber-physical systems (CPSs) have become increasingly crucial factors of our daily life. As a result, the networking protocols of CPSs have been developed to achieve availability without ...

research-article
ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS

Industrial control systems (ICS) have been widely adopted in mission-critical infrastructures. However, the increasing prevalence of cyberattacks targeting them has been a critical security concern. On the other hand, the high real-time and availability ...

Recommendations