A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems
[article]
2018
arXiv
pre-print
A hackfest named SWaT Security Showdown (S3) has been organized consecutively for two years. ...
In S3 independent attack teams design and launch attacks on SWaT while defence teams protect the plant passively and raise alarms upon attack detection. ...
Our thanks are due to Nils Tippenhauer, Martin Ochoa, and the staff of iTrust for organizing and judging the events; Kaung Myat Aung for invaluable assistance in the actual conduct of the events; Gyanendra ...
arXiv:1809.04786v1
fatcat:cokdtnlhovbr5htexfiq2uymcu
MiniCPS: A toolkit for security research on CPS Networks
[article]
2015
arXiv
pre-print
In addition to CPPPO, we also use the pycomm library for ENIP communications [16] . ...
For example, tag values could be queried every 100ms, and control commands could be sent every second, resulting into regular traffic patterns. ...
arXiv:1507.04860v1
fatcat:uvexiu4yjjegdoqpvgmbh7htnq
Scanning the Cycle: Timing-based Authentication on PLCs
2021
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
An attacker that spoofs commands issued by the PLCs would deviate from such fingerprints. To detect replay attacks a PLC Watermarking technique is proposed. ...
The proposed technique captures timing information for each controller in a non-invasive manner. ...
A customized python script was developed using pycomm library to get precise control of message transmission during the masquerading attack. ...
doi:10.1145/3433210.3453102
fatcat:reywnsgv4jh6vhbbnfefmvng6u