Threat Modelling of Cyber–Physical Systems Using an Applied π -Calculus
Tài liệu tham khảo
Zetter, 2014
Palmer, 2020
NIST, 2012
Shostack, 2014
UcedaVelez, 2015
Alberts, 2003
Fernandez, 2016, Threat modeling in cyber-physical systems, 448
Sadi, 2015, Co-simulation platform for characterizing cyber attacks in cyber physical systems, 1244
Milner, 1992, A calculus of mobile processes, i, Inform. and Comput., 100, 1, 10.1016/0890-5401(92)90008-4
Sangiorgi, 2003
Abadi, 1999, A calculus for cryptographic protocols: The spi calculus, Inform. and Comput., 148, 1, 10.1006/inco.1998.2740
Abadi, 2001, Mobile values, new names, and secure communication, ACM SIGPLAN Notices, 36, 104, 10.1145/373243.360213
Kremer, 2005, Analysis of an electronic voting protocol in the applied pi calculus, 186
Lanotte, 2017, A calculus of cyber-physical systems, 10168, 115
Parrow, 2001, An introduction to the pi-calculus, 479
Mo, 2014, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 22, 1396, 10.1109/TCST.2013.2280899
Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, IEEE Trans. Autom. Control, 58, 2715, 10.1109/TAC.2013.2266831
Amin, 2009, Safe and secure networked control systems under denial-of-service attacks, 31
Doostmohammadian, 2014, Vulnerability of CPS inference to dos attacks
Mo, 2009, Secure control against replay attacks
Sánchez, 2019, Detection of replay attacks in cyber-physical systems using a frequency-based signature, J. Franklin Inst. B, 356, 2798, 10.1016/j.jfranklin.2019.01.005
Nweke, 2020, Adversary model for attacks against IEC 61850 real-time communication protocols
Mo, 2010, False data injection attacks against state estimation in wireless sensor networks
Beg, 2017, Detection of false-data injection attacks in cyber-physical DC microgrids, IEEE Trans. Ind. Inform., 13, 2693, 10.1109/TII.2017.2656905
Chen, 2019, Real-time identification of false data injection attacks: A novel dynamic-static parallel state estimation based mechanism, IEEE Access, 7, 95812, 10.1109/ACCESS.2019.2929785
Zalewski, 2013, Threat modeling for security assessment in cyberphysical systems, 10
Martins, 2015, Towards a systematic threat modeling approach for cyber-physical systems, 1
Khan, 2017, STRIDE-based threat modeling for cyber-physical systems, 1
Almohri, 2017, On threat modeling and mitigation of medical cyber-physical systems, 114
Rekik, 2018, Cyber-physical threats and vulnerabilities analysis for train control and monitoring systems, 1
Atif, 2018
Rocchetto, 2016, On attacker models and profiles for cyber-physical systems, 427
Adepu, 2016, Generalized attacker and attack models for cyber physical systems
Adepu, 2016, An investigation into the response of a water treatment system to cyber attacks
Nweke, 2020, A review of asset-centric threat modelling approaches, Int. J. Adv. Comput. Sci. Appl., 11, 1, 10.14569/IJACSA.2020.0110201
Krotofil, 2014, Vulnerabilities of cyber-physical systems to stale data - determining the optimal time to launch attacks, Int. J. Crit. Infrastruct. Prot., 7, 213, 10.1016/j.ijcip.2014.10.003
Hughes, 2014, Three tenets for secure cyber-physical system design and assessment, Vol. 9097, 90970A
Plotkin, 1981
Milner, 1980, 174
Wu, 2018, Optimal data injection attacks in cyber-physical systems, IEEE Trans. Cybern., 48, 3302, 10.1109/TCYB.2018.2846365
Arapinis, 2014, Stateful applied pi calculus, 22, 10.1007/978-3-642-54792-8_2
Kordy, 2011, Foundations of attack–defense trees, 80, 10.1007/978-3-642-19751-2_6
Lamport, 1978, Time, clocks, and the ordering of events in a distributed system, Commun. ACM, 21, 558, 10.1145/359545.359563
Dolev, 1983, On the security of public key protocols, IEEE Trans. Inform. Theory, 29, 198, 10.1109/TIT.1983.1056650
International Electrotechnical Commission (IEC), 2011
Claveria, 2018, GOOSE Protocol: Ied’s smart solution for victoria university zone substation (VUZS) simulator based on IEC61850 standard, 730
