Liebl et al., 2024 - Google Patents
Threat analysis of industrial internet of things devicesLiebl et al., 2024
View PDF- Document ID
- 13678232139794541450
- Author
- Liebl S
- Lathrop L
- Raithel U
- Söllner M
- Aßmuth A
- Publication year
- Publication venue
- arXiv preprint arXiv:2405.16314
External Links
Snippet
As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these devices. In this paper, we examine …
- 238000004458 analytical method 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rubio et al. | Current cyber-defense trends in industrial control systems | |
Tuptuk et al. | Security of smart manufacturing systems | |
Knapp | Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems | |
Alladi et al. | Industrial control systems: Cyberattack trends and countermeasures | |
Lezzi et al. | Cybersecurity for Industry 4.0 in the current literature: A reference framework | |
Al-Hawawreh et al. | Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things | |
Case | Analysis of the cyber attack on the Ukrainian power grid | |
Zhu et al. | A taxonomy of cyber attacks on SCADA systems | |
Ahmed et al. | Scada systems: Challenges for forensic investigators | |
Green et al. | On the significance of process comprehension for conducting targeted ICS attacks | |
US20170223037A1 (en) | Using high-interaction networks for targeted threat intelligence | |
Jadidi et al. | A threat hunting framework for industrial control systems | |
Serhane et al. | Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats | |
Shehod | Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the US | |
Liebl et al. | Threat analysis of industrial internet of things devices | |
Ferencz et al. | Review of industry 4.0 security challenges | |
Mccarty et al. | Cybersecurity resilience demonstration for wind energy sites in co-simulation environment | |
Volk | A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures. | |
Liebl et al. | Analyzing the attack surface and threats of industrial Internet of Things devices | |
Piggin et al. | Active defence using an operational technology honeypot | |
Munro | SCADA–A critical situation | |
Wali | Analysis of security challenges in cloud-based SCADA systems: A survey | |
Silverman et al. | A study on vulnerabilities and threats to SCADA devices | |
Abaimov et al. | Selected issues of cyber security practices in CBRNeCy critical infrastructure | |
Caldwell | Plugging IT/OT vulnerabilities–part 1 |