2023 IEEE Symposium on Security and Privacy (SP) 2023
DOI: 10.1109/sp46215.2023.10179411
|View full text |Cite
|
Sign up to set email alerts
|

Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 55 publications
0
6
0
Order By: Relevance
“…These 11 packets represent a complete process, in which packets (1)-( 9) are the initialization phase and packets (10) and (11) are the data exchange phase. These constant values are necessary for attackers to launch semantic attacks.…”
Section: Building the Fsm Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…These 11 packets represent a complete process, in which packets (1)-( 9) are the initialization phase and packets (10) and (11) are the data exchange phase. These constant values are necessary for attackers to launch semantic attacks.…”
Section: Building the Fsm Modelmentioning
confidence: 99%
“…Additionally, there is no transfer to the initialization phase when the data exchange phase is in progress. For example, packet (10) activates the I/0 point position of the slave station and collects data from that point. The slave receives the packet (10) and communicates to the master that the current I/O position is in the active state packet (11).…”
Section: Building the Fsm Modelmentioning
confidence: 99%
See 3 more Smart Citations