CyberSecurity in a DevOps Environment 2023
DOI: 10.1007/978-3-031-42212-6_1
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs

Eduard Paul Enoiu,
Kejsi Biçoku,
Cristina Seceleanu
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
0
0
Order By: Relevance
“…Consequently, any modifications to sensors or actuators necessitate corresponding alterations to the source code and any subsequent actions. Moreover, PLC hardware and firmware are frequently proprietary and not publicly accessible, which, when coupled with the prevalent development approach, can give rise to security risks [15]. Although the event-driven architecture paradigm has existed for decades [16], its adoption in embedded software has gained popularity only recently, coinciding with the ascent of Industry 4.0 applications.…”
Section: Digital Twin Prototypesmentioning
confidence: 99%
“…Consequently, any modifications to sensors or actuators necessitate corresponding alterations to the source code and any subsequent actions. Moreover, PLC hardware and firmware are frequently proprietary and not publicly accessible, which, when coupled with the prevalent development approach, can give rise to security risks [15]. Although the event-driven architecture paradigm has existed for decades [16], its adoption in embedded software has gained popularity only recently, coinciding with the ascent of Industry 4.0 applications.…”
Section: Digital Twin Prototypesmentioning
confidence: 99%