2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) 2021
DOI: 10.1109/qrs54544.2021.00106
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…(iv) Results (R Sec ): Table 2. Some security assessment results 15 Each figure is an average of 10 consecutive measurements.…”
Section: Example 5 (Security Verification)mentioning
confidence: 99%
See 1 more Smart Citation
“…(iv) Results (R Sec ): Table 2. Some security assessment results 15 Each figure is an average of 10 consecutive measurements.…”
Section: Example 5 (Security Verification)mentioning
confidence: 99%
“…The positive and negative impacts of the evaluated countermeasures are then assessed by comparing the verification results. Formal modeling and verification for the assessment of cybersecurity-related events (countermeasures deployment, attacks) is well-suited to the context of CPS -including ICS -, and further promising contributions have been proposed by Jawad et Jaskolka in [15] regarding the impact assessment of cyberattacks, and by Jawad et al in [16] where the authors model a botnet infrastructure with UPPAAL NTAs and evaluate the efficiency of a countermeasure thanks to simulation. Nevertheless, as we explained in [24], a drawback of our previous approach [26] is that the NTA-based modeling formalism lacks in expressiveness with respect to data security aspects: for instance, data confidentiality is here modeled in a too simplistic way, with a boolean variable modeling an illegitimate access to the component processing the data.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, targeted spoofing attacks on one or more system agents may result in an unexpected sequence of events, leading to unpredictable outcomes. Such deviations from the normal behavior can lead to system malfunctions as well as damage to the production equipment or the final products [JJ21a].…”
Section: Threats To the Systemmentioning
confidence: 99%
“…A method to automatically generate timed automata models does not exist, and as such, for large ICSs, it becomes a largely manual and time-consuming practice [JJ21a].…”
Section: Prior Requirementsmentioning
confidence: 99%
See 1 more Smart Citation