Nothing Special   »   [go: up one dir, main page]

Balduzzi et al., 2020 - Google Patents

Lost in translation: when industrial protocol translation goes wrong

Balduzzi et al., 2020

View PDF
Document ID
6504662293790660756
Author
Balduzzi M
Bongiorni L
Flores R
Lin P
Perine C
Vosseler R
Publication year
Publication venue
Trend Micro

External Links

Snippet

The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current …
Continue reading at i.blackhat.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2705Parsing
    • G06F17/271Syntactic parsing, e.g. based on context-free grammar [CFG], unification grammars
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/28Processing or translating of natural language
    • G06F17/289Use of machine translation, e.g. multi-lingual retrieval, server side translation for client devices, real-time translation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B19/00Teaching not covered by other main groups of this subclass
    • G09B19/06Foreign languages
    • G09B19/08Printed or written appliances, e.g. text books, bilingual letter assemblies, charts

Similar Documents

Publication Publication Date Title
Pliatsios et al. A survey on SCADA systems: secure protocols, incidents, threats and tactics
Coffey et al. Vulnerability analysis of network scanning on SCADA systems
Makrakis et al. Industrial and critical infrastructure security: Technical analysis of real-life security incidents
Gao et al. SCADA communication and security issues
Rosa et al. A comprehensive security analysis of a SCADA protocol: From OSINT to mitigation
Rodofile et al. Extending the cyber-attack landscape for SCADA-based critical infrastructure
US20070192867A1 (en) Security appliances
Li et al. A critical review of cyber-physical security for building automation systems
Abe et al. Security threats of Internet-reachable ICS
Fauri et al. Encryption in ICS networks: A blessing or a curse?
Langill Defending against the dragonfly cyber security attacks
Ramachandruni et al. Detecting the network attack vectors on SCADA systems
McCarthy et al. Securing manufacturing industrial control systems: Behavioral anomaly detection
Makrakis et al. Vulnerabilities and attacks against industrial control systems and critical infrastructures
Pfrang et al. Detecting and preventing replay attacks in industrial automation networks operated with profinet IO
Slunjski et al. Off-the-shelf solutions as potential cyber threats to industrial environments and simple-to-implement protection methodology
Ovaz Akpinar et al. Development of the ECAT preprocessor with the trust communication approach
Weerathunga et al. The importance of testing Smart Grid IEDs against security vulnerabilities
Balduzzi et al. Lost in translation: when industrial protocol translation goes wrong
Mashima et al. Cybersecurity for Modern Smart Grid Against Emerging Threats
Silveira et al. Cyber vulnerability assessment of a digital secondary system in an electrical substation
Borhani et al. A critical analysis of the industrial device scanners’ potentials, risks, and preventives
Akbarzadeh et al. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
Morris et al. Cyber security testing and intrusion detection for synchrophasor systems
Carr Development of a tailored methodology and forensic toolkit for industrial control systems incident response