No abstract available.
Proceeding Downloads
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
Security aspects of SCADA environments and the systems within are increasingly a center of interest to researchers and security professionals. As the rise of sophisticated and nation-state malware targeting such systems flourishes, traditional digital ...
Graph-Based Data-Collection Policies for the Internet of Things
Smart industrial control systems (e.g., smart grid, oil and gas systems, transportation systems) are connected to the internet, and have the capability to collect and transmit data; as such, they are part of the IoT. The data collected can be used to ...
The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems
Much research effort has recently been devoted to securing Industrial Control Systems (ICS) in response to the increasing number of adverse incidents targeting nation-wide critical infrastructures. Leveraging the static and regular nature of the ...
A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response
- Andrés Felipe Murillo,
- Luis Francisco Cómbita,
- Andrea Calderón Gonzalez,
- Sandra Rueda,
- Alvaro A. Cardenas,
- Nicanor Quijano
The integration of modern information technologies with industrial control systems has created an enormous interest in the security of industrial control, however, given the cost, variety, and industry practices, it is hard for researchers to test and ...
Securing Your ICS Software with the AttackSurface Host Analyzer (AHA)
Implementing a secure development lifecycle (SDL) presents increasing challenges to software developers as they must ensure software correctly integrates both underlying operating system security features while also managing dependencies on third-party ...