A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics

Z Wang, Y Zhang, Y Chen, H Liu, B Wang, C Wang - Processes, 2023 - mdpi.com
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field
devices, play a vital role in current industrial control systems (ICSs), which are composed of …

Security of programmable logic controllers and related systems: today and tomorrow

W Alsabbagh, P Langendörfer - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) are indispensable in critical infrastructures and
industrial control systems. The increasing demand for enhanced cost-effectiveness and …

EM monitoring and classification of IEMI and protocol-based attacks on IEEE 802.11 n communication networks

J Villain, V Deniau, A Fleury, EP Simon… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The development of connected devices and their daily use is presently at the origin of the
omnipresence of Wi-Fi wireless networks. However, these Wi-Fi networks are often …

Critical infrastructure security: alignment of views

IF Mikhalevich, VA Trapeznikov - … and Processing in the Field of …, 2019 - ieeexplore.ieee.org
Critical infrastructures of all countries unites common cyberspace. In this space, there are
many threats that can disrupt the security of critical infrastructure in one country, but also …

A taxonomy of side channel attacks on critical infrastructures and relevant systems

N Tsalis, E Vasilellis, D Mentzelioti… - … Security and Resilience …, 2019 - Springer
Abstract Information disclosure leads to serious exploits, disruption or damage of critical
operations and privacy breaches, both in Critical Infrastructures (CIs) and Industrial Control …

WaC: First results on practical side-channel attacks on commercial machine learning accelerator

YS Won, S Chatterjee, D Jap, A Basu… - Proceedings of the 5th …, 2021 - dl.acm.org
Commercial machine learning accelerators like Intel neural Compute Stick 2 (NCS2) enable
efficient inference on otherwise low resource edge devices. However, these accelerators are …

Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software

MS Awal, MT Rahman - arXiv preprint arXiv:2310.03175, 2023 - arxiv.org
Discovering new vulnerabilities and implementing security and privacy measures are
important to protect systems and data against physical attacks. One such vulnerability is …

Side-channel aware fuzzing

P Sperl, K Böttinger - Computer Security–ESORICS 2019: 24th European …, 2019 - Springer
Software testing is becoming a critical part of the development cycle of embedded devices,
enabling vulnerability detection. A well-studied approach of software testing is fuzz-testing …

Fused sensor analysis and advanced control of industrial field devices for security: Cymbiote multi-source sensor fusion platform

T Rice, G Seppala, TW Edgar, D Cain… - Proceedings of the …, 2019 - dl.acm.org
Embedded field devices that sense and control physical processes in critical infrastructure
are soft targets for cyber-attack because they lack the fundamental features for existing cyber …

Discussing the feasibility of acoustic sensors for side channel-aided industrial intrusion detection: An essay

SDD Anton, AP Lohfink, HD Schotten - Proceedings of the Third Central …, 2019 - dl.acm.org
The fourth industrial revolution leads to an increased use of embedded computation and
intercommunication in an industrial environment. While reducing cost and effort for set up …