2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2016
DOI: 10.1109/cybersecpods.2016.7502336
|View full text |Cite
|
Sign up to set email alerts
|

Security in building automation systems - a first analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 12 publications
0
23
0
Order By: Relevance
“…After that, s/he obtained access to the Installation Bus and was able to collect data transmitted over the network (e.g., data exchanged between the Workstation and the HVAC). This was possible because messages exchanged through the installation bus are not encrypted [9]. The offender then sent a targeted Malware (e.g., exploiting the vulnerabilities present in Trane HVACs [10]) to disable the HVAC, subsequently causing the Servers to heat up.…”
Section: Motivating Examplementioning
confidence: 99%
“…After that, s/he obtained access to the Installation Bus and was able to collect data transmitted over the network (e.g., data exchanged between the Workstation and the HVAC). This was possible because messages exchanged through the installation bus are not encrypted [9]. The offender then sent a targeted Malware (e.g., exploiting the vulnerabilities present in Trane HVACs [10]) to disable the HVAC, subsequently causing the Servers to heat up.…”
Section: Motivating Examplementioning
confidence: 99%
“…There have been a number of recent works on BAS security. In [6], Mundt et al concluded several weaknesses in modern BASs ranging from field layer to automation and management layer, based on practical attacks against two office buildings where KNX and BACnet were deployed. Brauchli et al in [7] conducted their security assessment on a real home automation system, digitalSTORM, and derived attack vectors of BASs involving servers, devices, the communication bus and remote access.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, data related to these actions might not be collected and stored proactively, hence, any future investigations of similar incidents might be more difficult because some relevant evidence is missing. Moreover, identifying vulnerabilities in a system can be difficult, since a system as a smart building can contain several hundreds of components with various vulnerabilities that can be exploited [13]. Some vulnerabilities can be thus overlooked due to human errors.…”
Section: Motivating Examplementioning
confidence: 99%