Filters








2 Hits in 3.1 sec

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses [article]

Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes
2021 arXiv   pre-print
In recent years, we have seen an exponential increase in vulnerabilities reported for PLC control logic.  ...  Vulnerabilities in PLC programs might lead to attacks causing devastating consequences to the critical infrastructure, as shown in Stuxnet and similar attacks.  ...  The mapping was logged using XML and translated into formal rules for the specification.  ... 
arXiv:2006.04806v3 fatcat:axupsga555gbhpe7wou5p7ggni

Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science

Felix Freiling, Helmut Seidl, 2022 2022 Joint Workshop Of The German Research Training Groups In Computer Science June 12–June 15
2022
They arise e.g. when dealing with user data in XML processing.  ...  Investigation, 16, S104-S113, 2016 2 Brian Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, 1, 2003 3 Jain et al., SoK  ...  To demonstrate the applicability and relevance of Pollock, we experimented with systems belonging to four different classes: programming frameworks (e.g., data parsers modules), business intelligence tools  ... 
doi:10.25593/opus4-fau-19321 fatcat:ry4vd32xxbgldirrvymuaxxqwi