Matches in SemOpenAlex for { <https://semopenalex.org/work/W4387029074> ?p ?o ?g. }
Showing items 1 to 69 of
69
with 100 items per page.
- W4387029074 endingPage "1" @default.
- W4387029074 startingPage "1" @default.
- W4387029074 abstract "Industrial control systems (ICSs) are prevalent in critical infrastructures, where programmable logic controllers (PLCs) and physical instruments are integrated. However, multiple successful attacks against PLC control logic programs have caused significant damage to ICSs, which has led to an urgent need for detection and forensics of such attacks. Although several off-the-shelf defending mechanisms have been presented in the past, few of them can detect and locate the control logic attacks at run-time. In this paper, we propose a practical and automatic Control Logic Attack Detection and Forensics framework (CLADF) to conduct control logic attack detection and forensics in ICSs. Specifically, the core of CLADF includes 1) a control application extraction module to extract PLC binary control applications by simulating PLC normal upload functionality, 2) a control application reverse engineering module to disassemble binary control applications, and 3) an attack detection and forensics module for verifying the integrity of PLC control applications, recovering the normal control application, and locating the modified control instructions. We extensively evaluated CLADF in five different application scenarios and two real-world Schneider PLCs. For each PLC, we generated three types of 150 mutated control logic attacks. The results demonstrate that CLADF can effectively extract the run-time binary control application in different application scenarios and disassemble these binary control applications into assembly instructions. Moreover, CLADF can accurately detect the attacks and locate the modified subroutines." @default.
- W4387029074 created "2023-09-26" @default.
- W4387029074 creator A5011825909 @default.
- W4387029074 creator A5018806333 @default.
- W4387029074 creator A5056524306 @default.
- W4387029074 creator A5063638481 @default.
- W4387029074 creator A5074878694 @default.
- W4387029074 creator A5083863847 @default.
- W4387029074 date "2023-01-01" @default.
- W4387029074 modified "2023-09-26" @default.
- W4387029074 title "Control Logic Attack Detection and Forensics through Reverse-engineering and Verifying PLC Control Applications" @default.
- W4387029074 doi "https://doi.org/10.1109/jiot.2023.3318988" @default.
- W4387029074 hasPublicationYear "2023" @default.
- W4387029074 type Work @default.
- W4387029074 citedByCount "0" @default.
- W4387029074 crossrefType "journal-article" @default.
- W4387029074 hasAuthorship W4387029074A5011825909 @default.
- W4387029074 hasAuthorship W4387029074A5018806333 @default.
- W4387029074 hasAuthorship W4387029074A5056524306 @default.
- W4387029074 hasAuthorship W4387029074A5063638481 @default.
- W4387029074 hasAuthorship W4387029074A5074878694 @default.
- W4387029074 hasAuthorship W4387029074A5083863847 @default.
- W4387029074 hasConcept C111919701 @default.
- W4387029074 hasConcept C119599485 @default.
- W4387029074 hasConcept C127413603 @default.
- W4387029074 hasConcept C149635348 @default.
- W4387029074 hasConcept C154945302 @default.
- W4387029074 hasConcept C17500928 @default.
- W4387029074 hasConcept C2775924081 @default.
- W4387029074 hasConcept C2776350369 @default.
- W4387029074 hasConcept C37374048 @default.
- W4387029074 hasConcept C38652104 @default.
- W4387029074 hasConcept C40071531 @default.
- W4387029074 hasConcept C41008148 @default.
- W4387029074 hasConcept C71901391 @default.
- W4387029074 hasConcept C9390403 @default.
- W4387029074 hasConceptScore W4387029074C111919701 @default.
- W4387029074 hasConceptScore W4387029074C119599485 @default.
- W4387029074 hasConceptScore W4387029074C127413603 @default.
- W4387029074 hasConceptScore W4387029074C149635348 @default.
- W4387029074 hasConceptScore W4387029074C154945302 @default.
- W4387029074 hasConceptScore W4387029074C17500928 @default.
- W4387029074 hasConceptScore W4387029074C2775924081 @default.
- W4387029074 hasConceptScore W4387029074C2776350369 @default.
- W4387029074 hasConceptScore W4387029074C37374048 @default.
- W4387029074 hasConceptScore W4387029074C38652104 @default.
- W4387029074 hasConceptScore W4387029074C40071531 @default.
- W4387029074 hasConceptScore W4387029074C41008148 @default.
- W4387029074 hasConceptScore W4387029074C71901391 @default.
- W4387029074 hasConceptScore W4387029074C9390403 @default.
- W4387029074 hasFunder F4320321001 @default.
- W4387029074 hasLocation W43870290741 @default.
- W4387029074 hasOpenAccess W4387029074 @default.
- W4387029074 hasPrimaryLocation W43870290741 @default.
- W4387029074 hasRelatedWork W1996916941 @default.
- W4387029074 hasRelatedWork W2110796433 @default.
- W4387029074 hasRelatedWork W2374839035 @default.
- W4387029074 hasRelatedWork W2790622811 @default.
- W4387029074 hasRelatedWork W3155069932 @default.
- W4387029074 hasRelatedWork W4252573951 @default.
- W4387029074 hasRelatedWork W4256621493 @default.
- W4387029074 hasRelatedWork W4386710224 @default.
- W4387029074 hasRelatedWork W4386953529 @default.
- W4387029074 hasRelatedWork W2240394299 @default.
- W4387029074 isParatext "false" @default.
- W4387029074 isRetracted "false" @default.
- W4387029074 workType "article" @default.