[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

RINIERI et al. - Google Patents

Plc-Defuser: Detecting Hidden Ladder Logic Bombs in Plcs Via Control Flow Graph and Model Checking

RINIERI et al.

View PDF
Document ID
16050729226679549842
Author
RINIERI L
Iacobelli A
Melis A
Prandini M
Callegati F
Publication venue
Available at SSRN 5038203

External Links

Snippet

Abstract Industrial Control Systems (ICS) are responsible for the operations of critical industrial infrastructures such as water treatment facilities and nuclear plants. To control sensors and actuators, ICSs rely on Programmable Logic Controllers (PLCs), which have …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/05Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts

Similar Documents

Publication Publication Date Title
CN109063477B (en) Automatic intelligent contract code defect detection system and method
Zonouz et al. Detecting industrial control malware using automated PLC code analytics
Sun et al. SoK: Attacks on industrial control logic and formal verification-based defenses
Soliman et al. Verification and validation of safety applications based on PLCopen safety function blocks
US8572747B2 (en) Policy-driven detection and verification of methods such as sanitizers and validators
Dhaussy et al. Improving model checking with context modelling
Kormann et al. Automated test case generation approach for PLC control software exception handling using fault injection
US20190361788A1 (en) Interactive analysis of a security specification
Malchow et al. PLC Guard: A practical defense against attacks on cyber-physical systems
CN115828264A (en) Intelligent contract vulnerability detection method and system and electronic equipment
CN105807631A (en) PLC simulation-based industrial control intrusion detection method and intrusion detection system
Poorhadi et al. Analysing the impact of security attacks on safety using SysML and event-B
Kang et al. Iotbox: Sandbox mining to prevent interaction threats in iot systems
CN110096873A (en) It is derived by the automatic bait that patch converts
Elmqvist et al. Safety interfaces for component-based systems
Gleirscher et al. Qualification of proof assistants, checkers, and generators: Where are we and what next?
Zhang et al. Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
RINIERI et al. Plc-Defuser: Detecting Hidden Ladder Logic Bombs in Plcs Via Control Flow Graph and Model Checking
Ulewicz et al. Proving equivalence between control software variants for Programmable Logic Controllers
Zhu et al. HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing
Hossain et al. Integration testing based on indirect interaction for embedded system
Belli et al. Heterogeneous modeling and testing of software product lines
Chakraborty et al. Robustness Analysis of PLC Programs With Respect to Sensor Interaction in IoT
Iacobelli et al. Detection of Ladder Logic Bombs in PLC Control Programs: an Architecture based on Formal Verification
Da Silva et al. PLC Logic-Based Cybersecurity Risks Identification for ICS