2017
DOI: 10.3103/s0146411617020055
|View full text |Cite
|
Sign up to set email alerts
|

A logic-based framework for the security analysis of Industrial Control Systems

Abstract: Abstract. Industrial Control Systems (ICS) are used for monitoring and controlling critical infrastructures such as power stations, waste water treatment facilities, traffic lights, and many more. Lately, these systems have become a popular target for cyber attacks. Security is often an afterthought, leaving them vulnerable to all sorts of attacks. This article presents a formal approach for analysing the security of Industrial Control Systems, both during their design phase and while operational. A knowledge-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Their approach relies in representing both the model and the attack in SysML and is simulated within that framework. Lemaire et al propose a formal verification scheme using vulnerability data and a SysML system description [20]. Brunner et al proposed a combined model for safety and security based on Unified Modeling Language (UML) diagrams [21].…”
Section: Related Workmentioning
confidence: 99%
“…Their approach relies in representing both the model and the attack in SysML and is simulated within that framework. Lemaire et al propose a formal verification scheme using vulnerability data and a SysML system description [20]. Brunner et al proposed a combined model for safety and security based on Unified Modeling Language (UML) diagrams [21].…”
Section: Related Workmentioning
confidence: 99%
“…In [12] [13] proposes a study on efficiency of an Information Security Management System (ISMS) for ICS with compliance. In [14] presents a formal approach that automates the security analysis of ICS. In [15] explains a process of defense of securing ICS.…”
Section: Introductionmentioning
confidence: 99%