1 |
Kim, J. Y., "Understanding and importance of industrial control system security," SK Infosec Official Blog, 2016.
|
2 |
Kwon, J. W. and Park, J. H., "The new paradigm of malware, Stuxnet," AhnLab Special Report 3, 2010.
|
3 |
Lee, J. H. and Kim, U.-N., "Standard Introduction-Industrial Control System Security Requirements," TTA Journal, Serial No. 173, pp. 62-66, 2017.
|
4 |
Lei, C.., Donghong, L.., and Liang, M., "The spear to break the security wall of S7 CommPlus," BlackHat.
|
5 |
Malladi, S., Alves-Foss, J., and Heckendorn, R. B., "On Preventing Replay Attacks on Security Protocols," Proc. International Conference on Security and Management, 2002.
|
6 |
Monn, G. Y., "Stuxnet's Resurrection? Iran claims Israel has attacked," security news, 2018.
|
7 |
Na, J. H., "Safe firmware update of ITU-T SG17 industrial control system," TTA ICT Standard Weekly, 2016.
|
8 |
Sohn, J. M., Lee, I. T., and Lim, H. C., "Enhancement of Industrial Control Systems(ICS) Security for Service Company," The Korea Service Management Society, Vol. 20, No. 4, pp. 183-200, 2019.
DOI
|
9 |
Spenneberg, R., Bruggemann, M., and Schwartke, H., "PLC-blaster: a worm living solely in the PLC," in: Black Hat Asia 2016, Singapore, p. 16, 2016.
|
10 |
Syverson., P., "A taxonomy of replay attacks," In Proceedings of the Computer Security Foundations Workshop(CSFW97), pp. 187-191, 1994.
|
11 |
Wire Shark Wiki, https://wiki.wireshark.org/S7comm.
|
12 |
Xu, Y., Yang, Y., Li, T., Ju, J., and Wang, Q., "Review on cyber vulnerabilities of communication protocols in industrial control systems," 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, pp. 1-6, 2017.
|
13 |
Aura, T., "Strategies against replay attacks," In Proceedings of the 10th IEEE Computer Society Foundations Workshop, Rockport, MA, IEEE Computer Society Press, pp. 59-68, 1997.
|
14 |
Denning, D. and Sacco, G., "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, pp. 553-536, 1981.
DOI
|
15 |
FA Journal, "Siemens wins with TIA Portal," 2013.
|
16 |
Gong, L. and Syverson, P., "Fail-stop protocols: An approach to designing secure protocols," In 5th International Working Conference on Dependable Computing for Critical Applications, pp. 44-55, 1995.
|
17 |
Jung, I. K., "A Development Method of Web System Combining Service Oriented Architecture with Multi-Software Product Line," The Journal of Society for e-Business Studies, Vol. 24, No. 3, pp. 53-71, 2019.
|