RINIERI et al. - Google Patents
Plc-Defuser: Detecting Hidden Ladder Logic Bombs in Plcs Via Control Flow Graph and Model CheckingRINIERI et al.
View PDF- Document ID
- 16050729226679549842
- Author
- RINIERI L
- Iacobelli A
- Melis A
- Prandini M
- Callegati F
- Publication venue
- Available at SSRN 5038203
External Links
Snippet
Abstract Industrial Control Systems (ICS) are responsible for the operations of critical industrial infrastructures such as water treatment facilities and nuclear plants. To control sensors and actuators, ICSs rely on Programmable Logic Controllers (PLCs), which have …
- 238000004458 analytical method 0 abstract description 94
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3608—Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/05—Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109063477B (en) | Automatic intelligent contract code defect detection system and method | |
Zonouz et al. | Detecting industrial control malware using automated PLC code analytics | |
Sun et al. | SoK: Attacks on industrial control logic and formal verification-based defenses | |
Soliman et al. | Verification and validation of safety applications based on PLCopen safety function blocks | |
US8572747B2 (en) | Policy-driven detection and verification of methods such as sanitizers and validators | |
Dhaussy et al. | Improving model checking with context modelling | |
Kormann et al. | Automated test case generation approach for PLC control software exception handling using fault injection | |
US20190361788A1 (en) | Interactive analysis of a security specification | |
Malchow et al. | PLC Guard: A practical defense against attacks on cyber-physical systems | |
CN115828264A (en) | Intelligent contract vulnerability detection method and system and electronic equipment | |
CN105807631A (en) | PLC simulation-based industrial control intrusion detection method and intrusion detection system | |
Poorhadi et al. | Analysing the impact of security attacks on safety using SysML and event-B | |
Kang et al. | Iotbox: Sandbox mining to prevent interaction threats in iot systems | |
CN110096873A (en) | It is derived by the automatic bait that patch converts | |
Elmqvist et al. | Safety interfaces for component-based systems | |
Gleirscher et al. | Qualification of proof assistants, checkers, and generators: Where are we and what next? | |
Zhang et al. | Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems | |
RINIERI et al. | Plc-Defuser: Detecting Hidden Ladder Logic Bombs in Plcs Via Control Flow Graph and Model Checking | |
Ulewicz et al. | Proving equivalence between control software variants for Programmable Logic Controllers | |
Zhu et al. | HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory Testing | |
Hossain et al. | Integration testing based on indirect interaction for embedded system | |
Belli et al. | Heterogeneous modeling and testing of software product lines | |
Chakraborty et al. | Robustness Analysis of PLC Programs With Respect to Sensor Interaction in IoT | |
Iacobelli et al. | Detection of Ladder Logic Bombs in PLC Control Programs: an Architecture based on Formal Verification | |
Da Silva et al. | PLC Logic-Based Cybersecurity Risks Identification for ICS |