Proceedings of the First International Conference on Security of Internet of Things 2012
DOI: 10.1145/2490428.2490447
|View full text |Cite
|
Sign up to set email alerts
|

Run-time prediction and preemption of configuration attacks on embedded process controllers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Erroneous behavior of the controller is identified by running a model of the plant in accelerated mode to forecast the future behavior [9]. TAIGA, which separates the trusted components and protects them against latent malware and network reconfiguration, is discussed in [10].…”
Section: Introductionmentioning
confidence: 99%
“…Erroneous behavior of the controller is identified by running a model of the plant in accelerated mode to forecast the future behavior [9]. TAIGA, which separates the trusted components and protects them against latent malware and network reconfiguration, is discussed in [10].…”
Section: Introductionmentioning
confidence: 99%
“…TECEP (Trust Enhancement of Critical Embedded Processes) is our method of implementing application-specific critical system functions in a way that is beyond the reach of any local or remote software, regardless of the credentials [3]. This greatly reduces the attack surface.…”
Section: Introductionmentioning
confidence: 99%