The goal of this dissertation is to provide automated methods for security researchers to overcome ‘security through obscurity’ used by manufacturers of proprietary Industrial Control Systems (ICS). `White hat\u27 security analysts waste significant time reverse engineering these systems\u27 opaque network configurations instead of performing meaningful security auditing tasks. Automating the process of documenting proprietary protocol configurations is intended to improve independent security auditing of ICS networks. The major contributions of this dissertation are a novel approach for unsupervised lexical analysis of binary network data flows and analysis of the time series data extracted as a result. We demonstrate the utility of these ...
Industrial control system communication networks are vulnerable to reconnaissance, response injectio...
Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems ...
This dissertation describes progress in the state-of-the-art for developing and deploying formally v...
Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of p...
Industrial Control Systems (ICS) combine information technology with operation technology to monitor...
Today\u27s vehicle manufacturers do not tend to publish proprietary packet formats for the controlle...
Since the introduction of Stuxnet, security research of industrial control systems, or cyber-physica...
Securing the critical infrastructure of the United States is of utmost importance in ensuring the se...
2022 Summer.Includes bibliographical references.Heavy vehicles are crucial to a functioning economy ...
The ever-evolving technology interwoven into the transportation industry leaves it frequently at ris...
Recent events such as Stuxnet and the Shamoon Aramco have brought to light how vulnerable industrial...
Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the extern...
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A promi...
Modem network security products vary greatly in their underlying technology and architecture. Since ...
Industrial Control Systems are essential to managing national critical infrastructure, yet the secur...
Industrial control system communication networks are vulnerable to reconnaissance, response injectio...
Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems ...
This dissertation describes progress in the state-of-the-art for developing and deploying formally v...
Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of p...
Industrial Control Systems (ICS) combine information technology with operation technology to monitor...
Today\u27s vehicle manufacturers do not tend to publish proprietary packet formats for the controlle...
Since the introduction of Stuxnet, security research of industrial control systems, or cyber-physica...
Securing the critical infrastructure of the United States is of utmost importance in ensuring the se...
2022 Summer.Includes bibliographical references.Heavy vehicles are crucial to a functioning economy ...
The ever-evolving technology interwoven into the transportation industry leaves it frequently at ris...
Recent events such as Stuxnet and the Shamoon Aramco have brought to light how vulnerable industrial...
Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the extern...
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A promi...
Modem network security products vary greatly in their underlying technology and architecture. Since ...
Industrial Control Systems are essential to managing national critical infrastructure, yet the secur...
Industrial control system communication networks are vulnerable to reconnaissance, response injectio...
Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems ...
This dissertation describes progress in the state-of-the-art for developing and deploying formally v...