Proceedings of the 2nd Annual Industrial Control System Security Workshop 2016
DOI: 10.1145/3018981.3018985
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a vertically hardened DNP3 control stack for power applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Although SCADA is widely used due to its rapid development, recent studies have highlighted its vulnerabilities from a cyber-security and cyber-physical security perspective [14], [15], [22], [23], [27], [28], [30]- [37]. The threat of cyberattacks looms over SCADA systems that communicate with network protocols [22], [23], [27], [34], [38].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although SCADA is widely used due to its rapid development, recent studies have highlighted its vulnerabilities from a cyber-security and cyber-physical security perspective [14], [15], [22], [23], [27], [28], [30]- [37]. The threat of cyberattacks looms over SCADA systems that communicate with network protocols [22], [23], [27], [34], [38].…”
Section: Related Workmentioning
confidence: 99%
“…Several NPPs have been found vulnerable to cyberattacks, and various attempts have been made to improve nuclear security, using systematic [8] and dynamic mapping systems to determine which assets are most vulnerable to cyberattacks [9]. Famous industrial network protocols include Modbus [11], ICCP/TASE.2 [13], Distributed Network Protocol/DNP3 [12], [14], [15], and OPC [16]. Each has its unique characteristics, as well as its own unique methods for verifying the integrity and data security.…”
Section: Introductionmentioning
confidence: 99%
“…In [17], they designed another secure version of the MODBUS protocol using hashbased message authentication codes and built on SCTP (Stream Transmission Control Protocol). In [6], authors provided a Deep-Packet Inspection tool to verify syntactic correctness of DNP3 packets using the Hammer tool [28]. In [29], the authors formally verified secrecy and authentication properties of OPC-UA handshake protocols using the ProVerif tool [5].…”
Section: Related Workmentioning
confidence: 99%
“…In (Hayes and El-Khatib, 2013), they designed another secure version of the MODBUS protocol using hash-based message authentication codes and built on SCTP (Stream Transmission Control Protocol). In (Bratus et al, 2016), authors provided a Deep-Packet Inspection tool to verify syntactic correctness of DNP3 packets using the Hammer tool (Patterson and Hirsch, 2014). In (Puys et al, 2016), the authors formally verified secrecy and authentication properties of OPC-UA handshake protocols using the ProVerif tool (Blanchet, 2001).…”
Section: Related Workmentioning
confidence: 99%