A computer science perspective on digital transformation in production

P Brauner, M Dalibor, M Jarke, I Kunze… - ACM Transactions on …, 2022 - dl.acm.org
The Industrial Internet-of-Things (IIoT) promises significant improvements for the
manufacturing industry by facilitating the integration of manufacturing systems by Digital …

Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

J Bodenhausen, C Sorgatz, T Vogt, K Grafflage… - arXiv preprint arXiv …, 2023 - arxiv.org
Critical infrastructure constitutes the foundation of every society. While traditionally solely
relying on dedicated cable-based communication, this infrastructure rapidly transforms to …

A false sense of security? Revisiting the state of machine learning-based industrial intrusion detection

D Kus, E Wagner, J Pennekamp, K Wolsing… - Proceedings of the 8th …, 2022 - dl.acm.org
Anomaly-based intrusion detection promises to detect novel or unknown attacks on
industrial control systems by modeling expected system behavior and raising corresponding …

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants

J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …

Challenging channels: Encrypted covert channels within challenge-response authentication

T Schmidbauer, J Keller, S Wendzel - Proceedings of the 17th …, 2022 - dl.acm.org
Challenge-response authentication is an essential and omnipresent network service. Thus,
it is a lucrative target for attackers to transport covert information. We present two covert …

Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols

E Wagner, N Rothaug, K Wolsing… - 2023 IEEE 48th …, 2023 - ieeexplore.ieee.org
Industrial networks become increasingly interconnected, which opens the floodgates for
cyberattacks on legacy networks designed without security in mind. Consequently, the vast …

Collaboration is not evil: A systematic look at security research for industrial use

J Pennekamp, E Buchholz, M Dahlmanns… - arXiv preprint arXiv …, 2021 - arxiv.org
Following the recent Internet of Things-induced trends on digitization in general, industrial
applications will further evolve as well. With a focus on the domains of manufacturing and …

CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications

JD de Hoz Diego, T Madi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Security in Internet-of-Things (IoT) environments has become a major concern. This is partly
due to a large number of remotely exploitable IoT vulnerabilities in service authentication …

[图书][B] Secure Collaborations for the Industrial Internet of Things

J Pennekamp - 2024 - jpennekamp.de
Abstract The Industrial Internet of Things (IIoT) is leading to increasingly-interconnected and
networked industrial processes and environments, which, in turn, results in stakeholders …

Protocol Security in the Industrial Internet of Things

M Dahlmanns, K Wehrle - NOMS 2024-2024 IEEE Network …, 2024 - ieeexplore.ieee.org
Advances like Industry 4.0 lead to a rising number of Internet-connected industrial
deployments and thus an Industrial Internet of Things with growing attack vectors. To uphold …