A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses
[article]
2021
arXiv
pre-print
In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic. ...
However, the majority of the formal verification research investigated ad-hoc techniques targeting PLC programs. ...
Acknowledgment The authors would like to thank the anonymous reviewers for their insightful comments. ...
arXiv:2006.04806v3
fatcat:axupsga555gbhpe7wou5p7ggni
Testing embedded software: A survey of the literature
2018
Information and Software Technology
Results: Among the various aspects that we aim at covering, our review covers the types of testing topics studied, types of testing activity, types of test artifacts generated (e.g., test inputs or test ...
We believe that it will also be useful for the large world-wide community of software engineers and testers in the embedded software industry, by serving as an "index" to the vast body of knowledge in ...
In [Source 193], mutation-based test generation for PLC embedded software was conducted on 61 programs provided by Bombardier Transportation company. ...
doi:10.1016/j.infsof.2018.06.016
fatcat:nye7v5keuvbvdnm3qnlkkfac5e
A systematic literature review of how mutation testing supports quality assurance processes
2018
Software testing, verification & reliability
programs used in the case studies. ...
At first glance, it seems that the programs with complex errors cannot be explicitly generated by mutation testing. ...
., Symbolic Execution, Concolic Testing and Searchbased Testing, were used to support the automatic test data generation. ...
doi:10.1002/stvr.1675
fatcat:cfkjrerjefcqxp6fr7usbacsmy
Semantics-aware detection of targeted attacks: a survey
2016
Journal in Computer Virology and Hacking Techniques
We introduce a detailed literature evaluation schema in addition to a highly granular model for article categorization. ...
The selected articles are comprehensively reviewed and assessed in accordance to Kitchenham's guidelines for systematic literature reviews. ...
The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged. ...
doi:10.1007/s11416-016-0273-3
fatcat:flhbpc4uwbandby2adxi62t64u
Full Professor at Technische Hochschule Ingolstadt, Germany Seah Boon Keong, MIMOS Berhad, Malaysia Sylvia Kierkegaard, IAITL-International Association of IT Lawyers, Denmark Mthulisi Velempini
2016
Switzerland International Journal on Advances in Security
unpublished
The combination sacrifices only a small portion of QKD security by using the generated keys a limited number of times instead of just once. ...
QKD is a cutting-edge security technology that provides mathematically proven security by using quantum physical effects and information theoretical axioms to generate a guaranteed non-disclosed stream ...
Køien for the support in investigating and typesetting this work. ...
fatcat:ynra4cqwwzbpjcpxrjrcjhbd2i