2020
DOI: 10.1007/978-3-030-61638-0_15
|View full text |Cite
|
Sign up to set email alerts
|

Post-exploitation and Persistence Techniques Against Programmable Logic Controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The rootkit HARVEY [34] is able to replace benign control commands with malicious commands to cause large-scale failures of the system. Bytes and Zhou [2] analyzed the software internals of WAGO PFC200 Series PLCs, and presented several potentially practical methods for the attack payload persistence executing on the firmware components. It has been notified in February 2022 that an unauthenticated and remote attacker has successfully launched denial-of-service (DoS) attacks to several Siemens PLCs [52].…”
Section: Firmware Modification Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The rootkit HARVEY [34] is able to replace benign control commands with malicious commands to cause large-scale failures of the system. Bytes and Zhou [2] analyzed the software internals of WAGO PFC200 Series PLCs, and presented several potentially practical methods for the attack payload persistence executing on the firmware components. It has been notified in February 2022 that an unauthenticated and remote attacker has successfully launched denial-of-service (DoS) attacks to several Siemens PLCs [52].…”
Section: Firmware Modification Attacksmentioning
confidence: 99%
“…In recent decades, Industrial Control Systems (ICSs) have been widely deployed to control and monitor operations of critical infrastructures, including transportation, power grids, and water treatment units [1,2]. In recent decades, due to the trend of connecting ICSs to the Internet, the security of ICSs has received significant attention.…”
Section: Introductionmentioning
confidence: 99%
“…The authors defend that no universal method to gain persistence on IoT devices has been identified. In Bytes and Zhou (2020) Andrei Bytes et al analyze techniques used in Programmable Logic Controllers (PLC), extending Linux generic mechanisms to particular embedded Linux devices but without providing a suitable structure for them. Németh (2020) analyzes rootkit persistence techniques in IoT devices, identifying Linux Kernel Modules, ramdisk-based and user space programs as main categories.…”
Section: Approaches and Limitationsmentioning
confidence: 99%
“…The authors defend that no universal method to gain persistence on IoT devices has been identified. In [102] Andrei Bytes et al analyze techniques used in Programmable Logic Controllers (PLC), extending Linux generic mechanisms to particular embedded Linux devices but without providing a suitable structure for them. [440] analyzes rootkit persistence techniques in IoT devices, identifying Linux Kernel Modules, ramdiskbased and user space programs as main categories.…”
Section: Approaches and Limitationsmentioning
confidence: 99%