3 Hits in 0.99 sec

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems [article]

Sridhar Adepu, Aditya Mathur
2018 arXiv   pre-print
A hackfest named SWaT Security Showdown (S3) has been organized consecutively for two years.  ...  In S3 independent attack teams design and launch attacks on SWaT while defence teams protect the plant passively and raise alarms upon attack detection.  ...  Our thanks are due to Nils Tippenhauer, Martin Ochoa, and the staff of iTrust for organizing and judging the events; Kaung Myat Aung for invaluable assistance in the actual conduct of the events; Gyanendra  ... 
arXiv:1809.04786v1 fatcat:cokdtnlhovbr5htexfiq2uymcu

MiniCPS: A toolkit for security research on CPS Networks [article]

Daniele Antonioli, Nils Ole Tippenhauer
2015 arXiv   pre-print
In addition to CPPPO, we also use the pycomm library for ENIP communications [16] .  ...  For example, tag values could be queried every 100ms, and control commands could be sent every second, resulting into regular traffic patterns.  ... 
arXiv:1507.04860v1 fatcat:uvexiu4yjjegdoqpvgmbh7htnq

Scanning the Cycle: Timing-based Authentication on PLCs

Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya Mathur
2021 Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security  
An attacker that spoofs commands issued by the PLCs would deviate from such fingerprints. To detect replay attacks a PLC Watermarking technique is proposed.  ...  The proposed technique captures timing information for each controller in a non-invasive manner.  ...  A customized python script was developed using pycomm library to get precise control of message transmission during the masquerading attack.  ... 
doi:10.1145/3433210.3453102 fatcat:reywnsgv4jh6vhbbnfefmvng6u