2023
DOI: 10.1016/j.cose.2023.103116
|View full text |Cite
|
Sign up to set email alerts
|

Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Other operations can have a high impact, such as the destruction of infrastructure, which is possible via a cyber attack. This is especially so, as technology within our most critical infrastructure, now connected to the Internet, has major vulnerabilities that could lead to disastrous effects (Collier & Lackoff, 2008; Maesschalck et al, 2023). Rule 68 within the Manual discusses this and expands upon this in Rule 69, where it is agreed that a cyber operation with effects comparable to an operation that constitutes a use of force in a non‐cyber operation does constitute a use of force.…”
Section: Cyberspace Legislationmentioning
confidence: 99%
“…Other operations can have a high impact, such as the destruction of infrastructure, which is possible via a cyber attack. This is especially so, as technology within our most critical infrastructure, now connected to the Internet, has major vulnerabilities that could lead to disastrous effects (Collier & Lackoff, 2008; Maesschalck et al, 2023). Rule 68 within the Manual discusses this and expands upon this in Rule 69, where it is agreed that a cyber operation with effects comparable to an operation that constitutes a use of force in a non‐cyber operation does constitute a use of force.…”
Section: Cyberspace Legislationmentioning
confidence: 99%
“…However, this study relies on existing PLC artifacts in detecting memory attacks, and securing storage capacity is important because numerous PLC artifacts are stored in the database. Reference [18] provided a programmable logic controller variable block scanner, a tool for identifying vulnerabilities in PLCs. The PLC-VBS scanner is tested to be able to identify vulnerable bits and bytes within PLC memory and to allow attackers to interact with the device.…”
Section: Related Workmentioning
confidence: 99%
“…Building on some of the concepts of PCaaD [12], Maesschalck et al [16] show that many of the vendorprovided library functions contain a vulnerability that allows adversaries to change the operation of the PLC. The authors present a scanning tool to identify bytes, and therefore variables, in the target PLC's memory that are susceptible to being manipulated over the network.…”
Section: Related Workmentioning
confidence: 99%
“…By adhering to established programming standards, implementing secure programming practices, and following thorough testing and validation processes, organisations can minimise the likelihood of vulnerabilities being introduced into their ICS and physical process. However, many organisations rely on PLC code in the form of vendor-provided library functions [15], which are proprietary, unable to be edited, and demonstrably vulnerable [12], [16], meaning that many elements of secure PLC programming practices cannot be exercised when they are sorely needed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation