Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA) 2014
DOI: 10.1109/etfa.2014.7005242
|View full text |Cite
|
Sign up to set email alerts
|

Securing industrial automation and control systems using application whitelisting

Abstract: Application whitelisting is a method for establishing security by restricting systems to only execute applications that are on a given list -the white list. One of the main questions when using such technology within industrial control systems is whether anti-virus software becomes obsolete, and whether security patches of the underlying system are still required. To answer these questions, we have evaluated several application whitelisting solutions and present the evaluation method and the condensed test res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Smart prioritization makes use of existing knowledge, insights, and previous experiences related to system dynamics to identify an efficient and exceptionally effective defensive strategy [113]; • Test all patches in off-line test environments before implementation; • Implement application whitelisting on human-machine interfaces. Application whitelisting is a security technique that enhances security by allowing systems to run only those applications that have been explicitly approved and listed in a designated whitelist [114]; • Harden field devices, including tablets and smartphones; • Replace out-of-date software and hardware devices; • After conducting thorough testing to confirm that it will not disrupt ICS operations, disable unused ports and services on ICS devices; • Implement and test system backups and recovery processes; • Configure encryption and security for ICS protocols.…”
Section: Host Securitymentioning
confidence: 99%
“…Smart prioritization makes use of existing knowledge, insights, and previous experiences related to system dynamics to identify an efficient and exceptionally effective defensive strategy [113]; • Test all patches in off-line test environments before implementation; • Implement application whitelisting on human-machine interfaces. Application whitelisting is a security technique that enhances security by allowing systems to run only those applications that have been explicitly approved and listed in a designated whitelist [114]; • Harden field devices, including tablets and smartphones; • Replace out-of-date software and hardware devices; • After conducting thorough testing to confirm that it will not disrupt ICS operations, disable unused ports and services on ICS devices; • Implement and test system backups and recovery processes; • Configure encryption and security for ICS protocols.…”
Section: Host Securitymentioning
confidence: 99%
“…Obermeier et al apply whitelisting to applications for protecting industrial automation and control systems. They find application whitelisting to be an effective means of preventing the instal- lation of malware [13].…”
Section: Related Workmentioning
confidence: 99%