Back to Search Start Over

Handling Malicious Code on Control Systems.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Saglietti, Francesca
Oster, Norbert
Wan-Hui Tseng
Chin-Feng Fan
Source :
Computer Safety, Reliability & Security (9783540751007); 2007, p68-74, 7p
Publication Year :
2007

Abstract

After the 911 terrorist attacks, the American government thoroughly investigated the vulnerabilities of infrastructure environment and found that the lack of security protection of most automated control systems is a vulnerable point. In order to ensure security in control systems, it is urgent to investigate the issue of potential malicious code, especially that made by insiders. This paper first discusses the undecidability of identifying all kinds of malicious code on control systems. However, effort to analyzing malicious code pays since it may increase the difficulty of insider attacks and improve the safety and security of the system. This paper then classifies malicious codes based on control system characteristics. The potential malicious code classifications include time-dependent, data-dependent, behavior-dependent, input-dependent, violation of a certain theorem, and so on. Finally, the paper presents possible approaches to prevention and detection of malicious code on control systems. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540751007
Database :
Complementary Index
Journal :
Computer Safety, Reliability & Security (9783540751007)
Publication Type :
Book
Accession number :
33316588
Full Text :
https://doi.org/10.1007/978-3-540-75101-4_6