A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
A hackfest named SWaT Security Showdown (S3) has been organized consecutively for two years. ... In S3 independent attack teams design and launch attacks on SWaT while defence teams protect the plant passively and raise alarms upon attack detection. ... Our thanks are due to Nils Tippenhauer, Martin Ochoa, and the staff of iTrust for organizing and judging the events; Kaung Myat Aung for invaluable assistance in the actual conduct of the events; Gyanendra ...arXiv:1809.04786v1 fatcat:cokdtnlhovbr5htexfiq2uymcu
In addition to CPPPO, we also use the pycomm library for ENIP communications  . ... For example, tag values could be queried every 100ms, and control commands could be sent every second, resulting into regular traffic patterns. ...arXiv:1507.04860v1 fatcat:uvexiu4yjjegdoqpvgmbh7htnq
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
An attacker that spoofs commands issued by the PLCs would deviate from such fingerprints. To detect replay attacks a PLC Watermarking technique is proposed. ... The proposed technique captures timing information for each controller in a non-invasive manner. ... A customized python script was developed using pycomm library to get precise control of message transmission during the masquerading attack. ...doi:10.1145/3433210.3453102 fatcat:reywnsgv4jh6vhbbnfefmvng6u