Krotofil et al., 2014 - Google Patents
Are you threatening my hazards?Krotofil et al., 2014
View PDF- Document ID
- 7471642608156736470
- Author
- Krotofil M
- Larsen J
- Publication year
- Publication venue
- International Workshop on Security
External Links
Snippet
This paper presents a framework for discussing security in cyber-physical systems, built on a simple mental model of the relationship between security and safety that has protection flows at its core. We explain their separation of concerns and outline security issues which …
- 230000003340 mental 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0259—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
He et al. | Cyber‐physical attacks and defences in the smart grid: a survey | |
US10698378B2 (en) | Industrial control system smart hardware monitoring | |
Tantawy et al. | Model-based risk assessment for cyber physical systems security | |
US11689544B2 (en) | Intrusion detection via semantic fuzzing and message provenance | |
Krotofil et al. | Industrial control systems security: What is happening? | |
Alcaraz et al. | Analysis of requirements for critical control systems | |
Ayodeji et al. | Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors | |
Krotofil et al. | Are you threatening my hazards? | |
WO2020046371A1 (en) | Process control systems and devices resilient to digital intrusion and erroneous commands | |
Krotofil et al. | Securing industrial control systems | |
Campbell | Cybersecurity issues for the bulk power system | |
Van Vliet et al. | Forensics in industrial control system: a case study | |
Boyes | Trustworthy cyber-physical systems-a review | |
CA2927826C (en) | Industrial control system smart hardware monitoring | |
Azzam et al. | Grounds for suspicion: Physics-based early warnings for stealthy attacks on industrial control systems | |
Aslam et al. | Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective | |
ES2898895T3 (en) | A threat detection system for industrial controllers | |
Luchs et al. | Last line of defense: A novel ids approach against advanced threats in industrial control systems | |
US10268170B2 (en) | Validation of control command in substantially real time for industrial asset control system threat detection | |
Kosmowski et al. | Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors | |
Robles et al. | Vulnerabilities in SCADA and critical infrastructure systems | |
Mylrea et al. | Digital twin industrial immune system: AI-driven cybersecurity for critical infrastructures | |
Kriaa et al. | SCADA Safety and Security joint modeling (S-cube): case study of a dam | |
Lusk et al. | Cyber-Intrusion Auto-Response and Policy Management System (CAPMS) | |
Frigård | Security Information and Event Management Systems Monitoring Automation Systems |