On the Analysis of Vulnerability Chains in Industrial Networks (Contributo in atti di convegno)

Type
Label
  • On the Analysis of Vulnerability Chains in Industrial Networks (Contributo in atti di convegno) (literal)
Anno
  • 2008-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1109/WFCS.2008.4638740 (literal)
Alternative label
  • M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano (2008)
    On the Analysis of Vulnerability Chains in Industrial Networks
    in 7th IEEE International Workshop on Factory Communication Systems (WFCS 2008),, Dresden, 21-23 Maggio 2008
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano (literal)
Pagina inizio
  • 215 (literal)
Pagina fine
  • 224 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4638740 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • IEEE Press, pp. 215–224, (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 10 (literal)
Note
  • IEEE Xplore digital library (literal)
  • Scopu (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • CNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy (literal)
Titolo
  • On the Analysis of Vulnerability Chains in Industrial Networks (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-1-4244-2349-1 (literal)
Abstract
  • The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it