2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2017
DOI: 10.1109/etfa.2017.8247727
|View full text |Cite
|
Sign up to set email alerts
|

Towards a modular security testing framework for industrial automation and control systems: ISuTest

Abstract: Industrial automation and control systems (IACS) play a key role in modern production facilities. On the one hand, they provide real-time functionality to the connected field devices. On the other hand, they get more and more connected to local networks and the internet in order to facilitate use cases promoted by "Industry 4.0". This makes IACS susceptible to cyber-attacks which exploit vulnerabilities, for example in order to interrupt the automation process. Security testing targets at discovering those vul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…In particular, this allows for thorough tests, even if information on internal parts of the components is not accessible. We call our approach Smevolution and implement it based on the security testing framework ISuTest ® [6]. We evaluate Smevolution by running different fuzzer configurations against a SUT with artificial vulnerabilities.…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…In particular, this allows for thorough tests, even if information on internal parts of the components is not accessible. We call our approach Smevolution and implement it based on the security testing framework ISuTest ® [6]. We evaluate Smevolution by running different fuzzer configurations against a SUT with artificial vulnerabilities.…”
Section: Contributionsmentioning
confidence: 99%
“…On the one hand, we use a random fuzzer that performs the selection at random and uses the default mutation strategy provided by ISuTest ® . This mutation strategy is based on fixed heuristics crafted for black box network fuzzing [6]. We will refer to this random fuzzer as A_RANDOM in the following.…”
Section: Baseline Fuzzersmentioning
confidence: 99%
See 2 more Smart Citations
“…They conclude that none of the investigated tools completely answers industrial systems specificity and propose a new one fulfilling the requirements that they have identified for an ideal IACS fuzzer. The proposed fuzzer is integrated into the ISuTest security testing framework for IACS that was developed by the authors [13] to meet these requirements. This work resembles our approach in that it aims at supporting the security testing of IACS.…”
Section: Related Workmentioning
confidence: 99%