A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics
Z Wang, Y Zhang, Y Chen, H Liu, B Wang, C Wang - Processes, 2023 - mdpi.com
Programmable Logic Controllers (PLCs), as specialized task-oriented embedded field
devices, play a vital role in current industrial control systems (ICSs), which are composed of …
devices, play a vital role in current industrial control systems (ICSs), which are composed of …
Security of programmable logic controllers and related systems: today and tomorrow
W Alsabbagh, P Langendörfer - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) are indispensable in critical infrastructures and
industrial control systems. The increasing demand for enhanced cost-effectiveness and …
industrial control systems. The increasing demand for enhanced cost-effectiveness and …
Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats
This paper provides a review of the state-of-the-art of major Programmable Logic Controller
(PLC) based devices along with their security concerns. It discusses, mainly, the threats and …
(PLC) based devices along with their security concerns. It discusses, mainly, the threats and …
A flashback on control logic injection attacks against programmable logic controllers
W Alsabbagh, P Langendörfer - Automation, 2022 - mdpi.com
Programmable logic controllers (PLCs) make up a substantial part of critical infrastructures
(CIs) and industrial control systems (ICSs). They are programmed with a control logic that …
(CIs) and industrial control systems (ICSs). They are programmed with a control logic that …
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran… - IEEE Security & …, 2017 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) automate the control and monitoring of physical
industrial and infrastructure processes such as power generation, gas pipelines, and water …
industrial and infrastructure processes such as power generation, gas pipelines, and water …
Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions
W Alsabbagh, C Kim, P Langendörfer - IEEE Access, 2024 - ieeexplore.ieee.org
Open-source Programmable Logic Controller (OpenPLC) software is designed to be vendor-
natural and run on almost any computer or low-cost embedded devices eg, Raspberry Pi …
natural and run on almost any computer or low-cost embedded devices eg, Raspberry Pi …
How are industrial control systems insecure by design? A deeper insight into real-world programmable logic controllers
Programmable logic controllers (PLCs) have design features to enable operations, such as
real-time control of physical processes. These features have weaknesses, making PLCs …
real-time control of physical processes. These features have weaknesses, making PLCs …
A New Injection Threat on S7-1500 PLCs-Disrupting the Physical Process Offline
W Alsabbagh, P Langendöerfer - IEEE Open Journal of the …, 2022 - ieeexplore.ieee.org
Programmable Logic Controllers (PLCs) are increasingly connected and integrated into the
Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined …
Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined …
Intrusion detection in PLC-based industrial control systems using formal verification approach in conjunction with graphs
M Hailesellasie, SR Hasan - Journal of Hardware and Systems Security, 2018 - Springer
Vulnerability in industrial control systems (ICS) has increased radically in the past few
decades. This can be accounted to reasons including accessibility of ICS through Internet …
decades. This can be accounted to reasons including accessibility of ICS through Internet …
[HTML][HTML] Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool
Cyber security risk assessments provide a crucial starting point towards the understanding
of existing risk exposure, via which suitable mitigation strategies can be formed. Risk is …
of existing risk exposure, via which suitable mitigation strategies can be formed. Risk is …