Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 32nd Annual Conference on Computer Security Applications 2016
DOI: 10.1145/2991079.2991126
|View full text |Cite
|
Sign up to set email alerts
|

Cpac

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The key elements to be considered is the method selected to carry out risk assessments, deployed risk models, and adaptation of risk appetite to properly enumerate the threat landscape in particular cases in which IT and ICS integration takes place. Risk-mitigation plans have recently found their way in the cyber-physical ICS environment [51][52][53]. The key components of an informed defence-in-depth framework, within which assurance and functional controls could be integrated, are presented as follows.…”
Section: Orthogonal Defence-in-depth Frameworkmentioning
confidence: 99%
“…The key elements to be considered is the method selected to carry out risk assessments, deployed risk models, and adaptation of risk appetite to properly enumerate the threat landscape in particular cases in which IT and ICS integration takes place. Risk-mitigation plans have recently found their way in the cyber-physical ICS environment [51][52][53]. The key components of an informed defence-in-depth framework, within which assurance and functional controls could be integrated, are presented as follows.…”
Section: Orthogonal Defence-in-depth Frameworkmentioning
confidence: 99%
“…Offline formal control logic analysis have been investigated by solutions such as TSV [34], through symbolic execution and model checking mechanisms. Solutions such as WeaselBoard [38] and CPAC [10] perform runtime PLC execution monitoring using control logic and firmware-level reference monitor implementations. Most related to our paper, there have been attack and defense solutions that employ side-channel analyses to either disclose secret information (e.g., cryptographic keys [17]), or detect anomalous misbehavior (e.g., execution tracking [31]).…”
Section: Introductionmentioning
confidence: 99%
“…The increased complexity may trigger human mistakes and operational errors allowing an attack or an intrusion. Considering these issues, Etigowni et al [139] propose the cyber-physical access control solution (CRAC). The authors focus on a smart grid that comprises of sensors and programmable logic controllers (PLCs).…”
Section: M2m Security Solutionsmentioning
confidence: 99%