2019
DOI: 10.1007/978-3-030-28005-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Designing and Integrating IEC 62443 Compliant Threat Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…A couple of publications focus on the methodology to integrate the security testing and compliance process into the development lifecycle, either at the product development level [10] or at the system integration level [11]. However, our work examines specifically tools that can help this integration of the security testing into the CI/CD pipeline.…”
Section: Related Workmentioning
confidence: 99%
“…A couple of publications focus on the methodology to integrate the security testing and compliance process into the development lifecycle, either at the product development level [10] or at the system integration level [11]. However, our work examines specifically tools that can help this integration of the security testing into the CI/CD pipeline.…”
Section: Related Workmentioning
confidence: 99%
“…While some general recommendations may overlap with the suggestions given during the course of this paper, their focus is solely on post-quantum attacks that PKI systems might face and which cryptographic algorithms are needed to correspondingly protect IACS environments. Apart from these publications, other relevant papers focus on ISA/IEC 62443 threat analysis [9] and its application in engineering projects [22,21] without specifically addressing PKIs.…”
Section: Related Workmentioning
confidence: 99%
“…The STRIDE methodology is widely used for the assets and threats identification. An IEC 62443 compliant risk analysis was presented by M.Fockel et al [24] for the development of industrial control systems. This methodology was also used by Zhendong Ma and Christoph Schmittner for the threat modelling of connected and intelligent vehicles [25] and by A. Vasenev et al [3] for a automotive case considering specific OTA threats.…”
Section: Related Workmentioning
confidence: 99%