[go: up one dir, main page]

Liebl et al., 2024 - Google Patents

Threat analysis of industrial internet of things devices

Liebl et al., 2024

View PDF
Document ID
13678232139794541450
Author
Liebl S
Lathrop L
Raithel U
Söllner M
Aßmuth A
Publication year
Publication venue
arXiv preprint arXiv:2405.16314

External Links

Snippet

As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these devices. In this paper, we examine …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Rubio et al. Current cyber-defense trends in industrial control systems
Tuptuk et al. Security of smart manufacturing systems
Knapp Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems
Alladi et al. Industrial control systems: Cyberattack trends and countermeasures
Lezzi et al. Cybersecurity for Industry 4.0 in the current literature: A reference framework
Al-Hawawreh et al. Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things
Case Analysis of the cyber attack on the Ukrainian power grid
Zhu et al. A taxonomy of cyber attacks on SCADA systems
Ahmed et al. Scada systems: Challenges for forensic investigators
Green et al. On the significance of process comprehension for conducting targeted ICS attacks
US20170223037A1 (en) Using high-interaction networks for targeted threat intelligence
Jadidi et al. A threat hunting framework for industrial control systems
Serhane et al. Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats
Shehod Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the US
Liebl et al. Threat analysis of industrial internet of things devices
Ferencz et al. Review of industry 4.0 security challenges
Mccarty et al. Cybersecurity resilience demonstration for wind energy sites in co-simulation environment
Volk A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures.
Liebl et al. Analyzing the attack surface and threats of industrial Internet of Things devices
Piggin et al. Active defence using an operational technology honeypot
Munro SCADA–A critical situation
Wali Analysis of security challenges in cloud-based SCADA systems: A survey
Silverman et al. A study on vulnerabilities and threats to SCADA devices
Abaimov et al. Selected issues of cyber security practices in CBRNeCy critical infrastructure
Caldwell Plugging IT/OT vulnerabilities–part 1