2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346865
|View full text |Cite
|
Sign up to set email alerts
|

Internet-facing PLCs as a network backdoor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(40 citation statements)
references
References 1 publication
1
39
0
Order By: Relevance
“…More recently, at BlackHat USA 2015 Klick et al [20] demonstrated injection of malware into a SIMATIC S7-300 PLC without service disruption. In a follow on work, [32] demonstrated the feasibility of a PLC worm.…”
Section: A Backgroundmentioning
confidence: 99%
“…More recently, at BlackHat USA 2015 Klick et al [20] demonstrated injection of malware into a SIMATIC S7-300 PLC without service disruption. In a follow on work, [32] demonstrated the feasibility of a PLC worm.…”
Section: A Backgroundmentioning
confidence: 99%
“…This is because the graph comparison algorithm performs literal comparison on the two graphs' respective fields; therefore, it is not possible for the algorithm to return false discrepancies. In [12], researchers developed an attack that takes an execution time around 1.35 ms on a PLC with scan cycle of 150 ms. They argued that their injection is undetectable since it has small execution time compared to the scan cycle.…”
Section: Comparison With the State-of-the-art Methodologiesmentioning
confidence: 99%
“…This processes are not affected by the inserted code execution time and size. Therefore, [12]'s attack will be detected as long as it can be observed on the graph. In [23], researchers utilized formal verification and model checking techniques in order to detect intrusions in PLC codes that will violate safety requirements.…”
Section: Comparison With the State-of-the-art Methodologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…An SNMP scanner and a SOCKS proxy (Klick et al, 2015) on a Siemens S7-300 PLC was proven possible by inserting code in the beginning of a scan cycle of the PLCs, just like Stuxnet. This vulnerability introduces a network backdoor on which attackers could send packets into the network through an outward facing PLC.…”
Section: Related Workmentioning
confidence: 99%