1 |
Emerson, "Emerson Wireless Security - Automation Solutions", Emerson Process Management, Feb. 2016.
|
2 |
MSB, "Guide to Increased Security in Industrial Control Systems", Swedish Civil Contingencies Agency, Nov. 2014.
|
3 |
SANS Institute, "Securing Industrial Control Systems-2017", Jun. 2017.
|
4 |
Kaspersky, "Industrial Control Systems Vulnerabilities Statistics", 2016.
|
5 |
MITRE, https://cve.mitre.org/
|
6 |
Microsoft, https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx
|
7 |
Microsoft, Microsoft Threat Modeling Tool, https://www.microsoft.com/en-us/download/details.aspx?id=49168
|
8 |
Injae Lee, "Domestic and Overseas Introduction Trends of Smart Factory", Institute for Information and Communications Technology Promotion, Sep. 2016.
|
9 |
Edward A. Lee, "Cyber Physical Systems: Design Challenges", 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363-369, May. 2008.
|
10 |
Alvaro A. Cardenas, Saurabh Amin, Shankar Sastry, "Secure Control: Towards Survivable Cyber-Physical Systems", The 28th International Conference on Distributed Computing Systems Workshops, pp. 495-500, Jun. 2008.
|
11 |
Cyber Physical Systems Public Working Group, "Framework for Cyber-Physical Systems Release 1.0", May. 2016.
|
12 |
NIST, "Framework for Cyber-Physical Systems: Volume 1, Overview ", Jun. 2017.
|
13 |
NIST, "Framework for Cyber-Physical Systems: Volume 2, Working Group Reports", Jun. 2017.
|
14 |
Brian Meixell, "Out of Control: Demonstrating SCADA Exploitation", Black Hat USA 2013.
|
15 |
NIST, "Guide to Industrial Control Systems (ICS) Security ", 2015.
|
16 |
Karnouskos, Stamatis. "Stuxnet worm impact on industrial cyber-physical system security." IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society. IEEE, pp. 4490-4494, Jan. 2011.
|
17 |
Ciancamerla, Ester, Michele Minichino, and S. Palmieri. "Modeling cyber attacks on a critical infrastructure scenario." Information, intelligence, systems and applications (IISA), 2013 fourth international conference on. IEEE, pp. 1-6, Jul. 2013.
|
18 |
Spenneberg, Ralf, Maik Bruggemann, and Hendrik Schwartke. "Plc-blaster: A worm living solely in the plc." Black Hat Asia, Marina Bay Sands, Singapore, 2016.
|
19 |
DEF CON 25 Hacking Conference, https://www.defcon.org/html/defcon-25/dc-25-index.html
|
20 |
Wollschlaeger, Martin, Thilo Sauter, and Juergen Jasperneite. "The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0." IEEE Industrial Electronics Magazine, vol.11, no.1, pp. 17-27, Mar. 2017.
DOI
|
21 |
Black Hat USA 2016, http://www.blackhat.com/us-16/
|
22 |
Lucas Apa, "Compromising Industrial Facilities from 40 Miles Away", Black Hat USA 2013.
|
23 |
Kim, HyungJun. "Security and vulnerability of SCADA systems over IP-based wireless sensor networks." International Journal of Distributed Sensor Networks, vol.8, no.11, Jan. 2012.
|
24 |
Thilo Sauter, "The continuing evolution of integration in manufacturing automation", IEEE Industrial Electronics Magazine, vol.1, no.1, pp.10-19, May. 2007.
DOI
|
25 |
Sivakorn, Suphannee, Jason Polakis, and Angelos D. Keromytis. "HTTP Cookie Hijacking in the Wild: Security and Privacy Implications.", Black Hat USA 2016.
|
26 |
NIST, "Framework for Cyber-Physical Systems: Volume 3, Timing Annex ", Jun. 2017.
|
27 |
D. Bauer, D. Stock, T. Bauernhansl, "Movement Towards Service-orientation and App-orientation in Manufacturing IT", Procedia CIRP, vol.62, pp.199-204, May. 2017.
DOI
|
28 |
Korea Embedded Software and System Industry Association, "Smart Factory Status and Implications", KESSIA ISSUE REPORT, Nov. 2015.
|
29 |
James Kettle, "Server-Side Template Injection: RCE for the modern webapp", Black Hat USA 2015.
|
30 |
Vanhoef, Mathy, and Tom Van Goethem. "HEIST: HTTP Encrypted Information can be Stolen through TCP-windows.", Black Hat USA 2016.
|
31 |
OWASP AppSec Europe '16, https://2016.appsec.eu/
|
32 |
Kyle Wilhoit, "The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems", Black Hat USA 2015.
|
33 |
Jason Larsen, "Remote Physical Damage 101 - Bread And Butter Attacks", Black Hat USA 2015.
|
34 |
ShmooCon Speakers 2016, http://shmoocon.org/2015/12/08/shmoocon-speakers-2016/
|
35 |
Sergey Temnikov, "Pwning the Industrial IoT: RCEs and backdoors are around!", DEF CON 25, 2017
|
36 |
Black Hat Asia 2017, https://www.blackhat.com/asia-17/
|