[图书][B] Protecting Systems from Exploits Using Language-Theoretic Security

P Anantharaman - 2022 - search.proquest.com
Any computer program processing input from the user or network must validate the input.
Input-handling vulnerabilities occur in programs when the software component responsible …

A communications validity detector for SCADA networks

P Anantharaman, A Chachra, S Sinha, M Millian… - … Protection XV: 15th IFIP …, 2022 - Springer
Supervisory control and data acquisition systems (SCADA) are attractive targets due to their
widespread use in the critical infrastructure. A large percentage of attacks involve crafted …

[PDF][PDF] CVD: A Communications Validity Detector for SCADA Networks

P Anantharaman, A Chachra, S Sinha, MC Millian… - cs.dartmouth.edu
Supervisory Control and Data Acquisition (SCADA) systems are a lucrative attack target due
to physical impacts. A large percentage of these attacks are crafted input attacks. Buffer …