2013
DOI: 10.1016/j.ijcip.2013.04.004
|View full text |Cite
|
Sign up to set email alerts
|

Firmware modification attacks on programmable logic controllers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
75
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 135 publications
(75 citation statements)
references
References 2 publications
0
75
0
Order By: Relevance
“…Therefore we hypothesise that there are potential artefacts in the reprogrammed code, that can be used the to establish the attacker's intentions (Falliere et al, 2011). There are other malicious attacks on PLCs such as firmware counterfeiting and modifications (Basnight, 2013) and uploading of malware (McLaughlin, 2011). This paper focuses on a modification attack on the PLC program code, as to our knowledge there has been limited research in this area (considering this occurred in the Stuxnet attack).…”
Section: Existing Researchmentioning
confidence: 99%
“…Therefore we hypothesise that there are potential artefacts in the reprogrammed code, that can be used the to establish the attacker's intentions (Falliere et al, 2011). There are other malicious attacks on PLCs such as firmware counterfeiting and modifications (Basnight, 2013) and uploading of malware (McLaughlin, 2011). This paper focuses on a modification attack on the PLC program code, as to our knowledge there has been limited research in this area (considering this occurred in the Stuxnet attack).…”
Section: Existing Researchmentioning
confidence: 99%
“…Before the highly publicized Stuxnet malware, most of the attacks were trivial intrusions against the IT equipment of industrial control network. However, the Stuxnet malware has intensified a race to the bottom where low-level attacks have a tactical advantage [2] and are therefore preferred [23]. PLCs play a significant role in the industry since they control and monitor industrial processes in critical infrastructures [13].…”
Section: Introductionmentioning
confidence: 99%
“…Various research shown the feasibility of such attacks [8], [19], [20] against PLCs. To defeat this attack, the industry is using logic checksums and IDS [18], [21], [2]. -Control-flow attacks: in general, this category of attacks is achieved by exploiting a memory corruption vulnerability (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, working with an incorrect base address may lead to inaccurate interpretations of segments referenced by immediate addresses. Therefore, knowledge of the true base address is critical in understanding the binary file as a whole [5].…”
mentioning
confidence: 99%