A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses
[article]
2021
arXiv
pre-print
In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic. ...
Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks. ...
The mapping was logged using XML and translated into formal rules for the specification. ...
arXiv:2006.04806v3
fatcat:axupsga555gbhpe7wou5p7ggni
Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science
2022
They arise e.g. when dealing with user data in XML processing. ...
Investigation, 16, S104-S113, 2016 2 Brian Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, 1, 2003 3 Jain et al., SoK ...
To demonstrate the applicability and relevance of Pollock, we experimented with systems belonging to four different classes: programming frameworks (e.g., data parsers modules), business intelligence tools ...
doi:10.25593/opus4-fau-19321
fatcat:ry4vd32xxbgldirrvymuaxxqwi