Browse > Article

PLC 기반의 제어시스템 취약점 분석 방법  

Kim, Dongwook (국가보안기술연구소)
Min, Byunggil (국가보안기술연구소)
Park, Hyun-Dong (국가보안기술연구소)
Park, Sangwoo (국가보안기술연구소)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 ICS-CERT, http://ics-cert.us-cert.gov/alerts/ICS-ALERT-12-020-02A,
2 ICS-CERT, http://ics-cert.us-cert.gov/alerts/ICS-ALERT-12-019-01A
3 ICS-CERT, http://ics-cert.us-cert.gov/advisories/ICSA-12-320-01
4 Nicolas Falliere, Liam O Murchu, Eric Chien, "W32.Stuxnet Dossier v1.3", Symantec Security Response, November, 2010
5 SHINE, http://www.icscybersecurityconference.com/session/project-shine-update/
6 ICS-CERT, http://ics-cert.us-cert.gov
7 BaseCamp Project, http://www.digitalbond.com/tools/basecamp/
8 G. Morten, Creating a Weapon of Mass Disruption: Attacking Programmable Logic Controllers, Master Thesis, 2013
9 Frank Swiderski and Window Snnyder. Threat modeling. O'Reilly Media, Inc., 2009
10 미래창조과학부, 주요정보통신기반시설 취약점 분석.평가 기준, 미래창조과학부고시 제2013-37호 주요정보통신기반시설 취약점 분석.평가 기준
11 Department of Homeland Security, Common Cybersecurity Vulnerabilities in Industrial Control Systems", May 2011