2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2013
DOI: 10.1109/iih-msp.2013.114
|View full text |Cite
|
Sign up to set email alerts
|

Security Testing Methods and Techniques of Industrial Control Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…According to National Institute of Standards and Technology (NIST) guidelines [138]- [139], a welldesigned, reliable, secure, robust and reliable system ensures trust between IoT and CPS based on various multifactors such as safety, security, privacy, consistency, dependability, resiliency, reliability, interaction and coordination. Several CPS testing tools are used to evaluate the protection of the CPSs based on these factors [140]. For example, a testing mechanism suggested by Zhou et al…”
Section: Reasons For Cps Vulnerabilitiesmentioning
confidence: 99%
“…According to National Institute of Standards and Technology (NIST) guidelines [138]- [139], a welldesigned, reliable, secure, robust and reliable system ensures trust between IoT and CPS based on various multifactors such as safety, security, privacy, consistency, dependability, resiliency, reliability, interaction and coordination. Several CPS testing tools are used to evaluate the protection of the CPSs based on these factors [140]. For example, a testing mechanism suggested by Zhou et al…”
Section: Reasons For Cps Vulnerabilitiesmentioning
confidence: 99%
“…Devices that are to be evaluated and certified interact with the EPS-ICS testbed via a network interface or TAP device using Layer 2 access. Table 1 shows some common testing devices that can interact with the EPS-ICS testbed [13].…”
Section: Device Evaluation and Certificationmentioning
confidence: 99%
“…The vulnerability of the networked control system has been widely studied and discussed by both academia and industry, mainly including: information management vulnerability [9], operating system and database vulnerability [10,11], embedded control device vulnerability [11][12][13], and industrial communication protocol vulnerability [14][15][16]. As the major communication carrier for different industrial control devices, the industrial communication protocols are always utilized by malicious hackers as a breakout to perform various attacks.…”
Section: Introductionmentioning
confidence: 99%