2019
DOI: 10.1016/j.cose.2018.09.018
|View full text |Cite
|
Sign up to set email alerts
|

Formally and practically verifying flow properties in industrial systems

Abstract: Industrial systems are nowadays regularly the target of cyberattacks, the most famous being Stuxnet. At the same time such systems are increasingly interconnected with other systems and insecure media such as Internet. In contrast to other IT systems, industrial systems often do not only require classical properties like data confidentiality or authentication of the communication, but have special needs due to their interaction with physical world. For example, the reordering or deletion of some commands sent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Scyther and Tamarin Prover [12] have been also used to verify other standardized protocols such as IKEv1/v2 in IPsec [13], entity authentication protocols in ISO/IEC 9798 [14], TLS 1.3 [15], 5G-AKA [16] and smart grid authentication protocol SAv5 in IEEE 1815-2012 [17] and others. Dreier et al [26] showed verification results of industrial protocols OPC-UA and MODBUS with Tamarin Prover, and gave a modeling of sequence numbers and counters. While their analysis focuses on flow integrity, our analysis focuses on confidentiality (secrecy and strong secrecy) and authenticity that imply flow integrity.…”
Section: Related Workmentioning
confidence: 99%
“…Scyther and Tamarin Prover [12] have been also used to verify other standardized protocols such as IKEv1/v2 in IPsec [13], entity authentication protocols in ISO/IEC 9798 [14], TLS 1.3 [15], 5G-AKA [16] and smart grid authentication protocol SAv5 in IEEE 1815-2012 [17] and others. Dreier et al [26] showed verification results of industrial protocols OPC-UA and MODBUS with Tamarin Prover, and gave a modeling of sequence numbers and counters. While their analysis focuses on flow integrity, our analysis focuses on confidentiality (secrecy and strong secrecy) and authenticity that imply flow integrity.…”
Section: Related Workmentioning
confidence: 99%
“…Scyther and Tamarin Prover [11] have been also used to verify other standardized protocols such as IKEv1/v2 in IPsec [12], entity authentication protocols in ISO/IEC 9798 [13], TLS 1.3 [14], 5G-AKA [15] and smart grid authentication protocol SAv5 in IEEE 1815-2012 [16] and others. Dreier et al [25] showed verification results of industrial protocols OPC-UA and MODBUS with Tamarin Prover, and gave a modeling of sequence numbers and counters. While their analysis focuses on flow integrity, our analysis focuses on confidentiality (secrecy and strong secrecy) and authenticity that imply flow integrity.…”
Section: Related Workmentioning
confidence: 99%