2018 13th International Conference on Malicious and Unwanted Software (MALWARE) 2018
DOI: 10.1109/malware.2018.8659368
|View full text |Cite
|
Sign up to set email alerts
|

Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…So, security is necessary to avoid disaster and loss of life. Security issues for DDS were analyzed in [16,17]. Touching on our previous research, we have analyzed the existing data transmission standards in the IoT [18] and the performance of DDS services [19].…”
Section: Related Workmentioning
confidence: 99%
“…So, security is necessary to avoid disaster and loss of life. Security issues for DDS were analyzed in [16,17]. Touching on our previous research, we have analyzed the existing data transmission standards in the IoT [18] and the performance of DDS services [19].…”
Section: Related Workmentioning
confidence: 99%
“…When running the |kinit| command, the password has to be manually entered; however, manually typing the password is not required if run with passing in the long-term key. This authentication is important in mitigating impersonation attacks because if the attacker does not have access to the keytab, DDS-C does not allow them to impersonate a node or domain participant [5][6][7]. For example, an attacker is able to get on the same network and deploys a rogue node to communicate with other nodes.…”
Section: Dds-cerberus (Dds-c)mentioning
confidence: 99%
“…The messages have QoS properties to determine the sender and messages' behavior. Despite its efficient and real-time message sending capabilities, DDS is prone to impersonation attacks which allow an attacker to gain unauthorized access to messages [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, it is worth mentioning that not every DDS product and service are compliant to the security specification and even compliant implementations might be affected by vulnerabilities. In fact, as shown in [58], node misconfiguration can be abused to perform malicious activities inside a DDS environment.…”
Section: Ddsmentioning
confidence: 99%