Filters








5 Hits in 2.6 sec

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses [article]

Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes
2021 arXiv   pre-print
In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic.  ...  However, the majority of the formal verification research investigated ad-hoc techniques targeting PLC programs.  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their insightful comments.  ... 
arXiv:2006.04806v3 fatcat:axupsga555gbhpe7wou5p7ggni

Testing embedded software: A survey of the literature

Vahid Garousi, Michael Felderer, Çağrı Murat Karapıçak, Uğur Yılmaz
2018 Information and Software Technology  
Results: Among the various aspects that we aim at covering, our review covers the types of testing topics studied, types of testing activity, types of test artifacts generated (e.g., test inputs or test  ...  We believe that it will also be useful for the large world-wide community of software engineers and testers in the embedded software industry, by serving as an "index" to the vast body of knowledge in  ...  In [Source 193], mutation-based test generation for PLC embedded software was conducted on 61 programs provided by Bombardier Transportation company.  ... 
doi:10.1016/j.infsof.2018.06.016 fatcat:nye7v5keuvbvdnm3qnlkkfac5e

A systematic literature review of how mutation testing supports quality assurance processes

Qianqian Zhu, Annibale Panichella, Andy Zaidman
2018 Software testing, verification & reliability  
programs used in the case studies.  ...  At first glance, it seems that the programs with complex errors cannot be explicitly generated by mutation testing.  ...  ., Symbolic Execution, Concolic Testing and Searchbased Testing, were used to support the automatic test data generation.  ... 
doi:10.1002/stvr.1675 fatcat:cfkjrerjefcqxp6fr7usbacsmy

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
We introduce a detailed literature evaluation schema in addition to a highly granular model for article categorization.  ...  The selected articles are comprehensively reviewed and assessed in accordance to Kitchenham's guidelines for systematic literature reviews.  ...  The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged.  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

Full Professor at Technische Hochschule Ingolstadt, Germany Seah Boon Keong, MIMOS Berhad, Malaysia Sylvia Kierkegaard, IAITL-International Association of IT Lawyers, Denmark Mthulisi Velempini

Masahito Hayashi, Vladimir Stantchev, Wolfgang Boehmer, Manuel Gil Pérez, Hans-Joachim Hof, Syed Naqvi, Steffen Wendzel, Fraunhofer Fkie, Germany Bonn, M Geir, Køien, Gerardo Adesso (+96 others)
2016 Switzerland International Journal on Advances in Security   unpublished
The combination sacrifices only a small portion of QKD security by using the generated keys a limited number of times instead of just once.  ...  QKD is a cutting-edge security technology that provides mathematically proven security by using quantum physical effects and information theoretical axioms to generate a guaranteed non-disclosed stream  ...  Køien for the support in investigating and typesetting this work.  ... 
fatcat:ynra4cqwwzbpjcpxrjrcjhbd2i