2014
DOI: 10.1109/msp.2014.114
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Techniques for Field Device Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Traditionally, embedded control systems were not considered prominent attack targets due to their isolation from potential attack sources. However, the historical isolation has begun to break down as more and more embedded devices are connected to business networks and the Internet in the trend of IoT, making CPS control programs increasingly vulnerable [37].…”
Section: Cps Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditionally, embedded control systems were not considered prominent attack targets due to their isolation from potential attack sources. However, the historical isolation has begun to break down as more and more embedded devices are connected to business networks and the Internet in the trend of IoT, making CPS control programs increasingly vulnerable [37].…”
Section: Cps Backgroundmentioning
confidence: 99%
“…Bare-metal CPS Devices: Our anomaly detection system works on the granularity of system calls and it leverages dynamic tracing facilities such as the strace tool, which requires the operating system support. An important reason behind our choice is that, the new generation of embedded control devices on the market are increasingly coming with operating systems [35], [37]. For example, Raspberry Pi devices with embedded Linux OS have been used as field devices in many CPS/IoT applications [62].…”
Section: Limitationmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, the main reasons for the vulnerabilities of networked control systems can be summarized in two aspects: from the perspective of their internal architectures, because the industrial-oriented communication protocols, real-time operating systems or embedded hardware/software platforms lack the applicable security mechanisms, the attackers can easily perform the destructive operations by exploiting the intrinsic system weaknesses [14], [15]; from the perspective of the external network environment, because the communication mechanism has developed into the IP-based communication pattern, the traditional IT threats can uncontrollably infiltrate into industrial control networks and cause significant damage [6], [16]. As a result, both academia and industry are now developing security solutions serving specially in networked control systems, and these solutions generally relate to threat prevention [17], [18], vulnerability evaluation [19], [20] and intrusion detection [13], [21]. As a bypass approach to detect misbehaviors without disrupting the availability and real-time performance of networked control systems, intrusion detection has been attracting great interests of researchers.…”
Section: Introductionmentioning
confidence: 99%
“…For years, industrial control systems (ICS) were physically isolated from any external network or they are only connected to trusted hardware or communication link [1,2]. Hence, security was not in the picture of ICS world.…”
Section: Introductionmentioning
confidence: 99%