Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. Abbasi, A., Hashemi, M., Zambon, E., & Etalle, S. In Havârneanu, G. M., Setola, R., Nassopoulos, H., & Wolthusen, S. D., editors, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, volume 10242, of Lecture Notes in Computer Science, pages 1–12, 2016. Springer.
Paper doi bibtex 3 downloads @inproceedings{DBLP:conf/critis/AbbasiHZE16,
author = {Ali Abbasi and
Majid Hashemi and
Emmanuele Zambon and
Sandro Etalle},
editor = {Grigore M. Hav{\^{a}}rneanu and
Roberto Setola and
Hypatia Nassopoulos and
Stephen D. Wolthusen},
title = {Stealth Low-Level Manipulation of Programmable Logic Controllers {I/O}
by Pin Control Exploitation},
booktitle = {Critical Information Infrastructures Security - 11th International
Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10242},
pages = {1--12},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-71368-7\_1},
doi = {10.1007/978-3-319-71368-7\_1},
timestamp = {Mon, 10 May 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/critis/AbbasiHZE16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 3
{"_id":"gZBmvFcz6EHrNJpHB","bibbaseid":"abbasi-hashemi-zambon-etalle-stealthlowlevelmanipulationofprogrammablelogiccontrollersiobypincontrolexploitation-2016","authorIDs":["8GDRtnKa7HgrEaB4z","AHBcZdsmHCWDgtpC7","DH5JdmwxHqaXbBvEA","SkaZcE3z5iJeCHkaJ","TfED66CoJYGCLZYuT","TjDPaZbFguW9SL9i4","YMq7twBerkTLPzjFA","ZuF937trtie4BQLu7","azQ52wqDwKz7CXhcT","exDrBuNqQrwcXC3at","f7jaSovysnJBH42jJ","khBkuJmWPrzrmvsuq"],"author_short":["Abbasi, A.","Hashemi, M.","Zambon, E.","Etalle, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]},{"firstnames":["Majid"],"propositions":[],"lastnames":["Hashemi"],"suffixes":[]},{"firstnames":["Emmanuele"],"propositions":[],"lastnames":["Zambon"],"suffixes":[]},{"firstnames":["Sandro"],"propositions":[],"lastnames":["Etalle"],"suffixes":[]}],"editor":[{"firstnames":["Grigore","M."],"propositions":[],"lastnames":["Havârneanu"],"suffixes":[]},{"firstnames":["Roberto"],"propositions":[],"lastnames":["Setola"],"suffixes":[]},{"firstnames":["Hypatia"],"propositions":[],"lastnames":["Nassopoulos"],"suffixes":[]},{"firstnames":["Stephen","D."],"propositions":[],"lastnames":["Wolthusen"],"suffixes":[]}],"title":"Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation","booktitle":"Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers","series":"Lecture Notes in Computer Science","volume":"10242","pages":"1–12","publisher":"Springer","year":"2016","url":"https://doi.org/10.1007/978-3-319-71368-7\\_1","doi":"10.1007/978-3-319-71368-7_1","timestamp":"Mon, 10 May 2021 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/critis/AbbasiHZE16.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/critis/AbbasiHZE16,\n author = {Ali Abbasi and\n Majid Hashemi and\n Emmanuele Zambon and\n Sandro Etalle},\n editor = {Grigore M. Hav{\\^{a}}rneanu and\n Roberto Setola and\n Hypatia Nassopoulos and\n Stephen D. Wolthusen},\n title = {Stealth Low-Level Manipulation of Programmable Logic Controllers {I/O}\n by Pin Control Exploitation},\n booktitle = {Critical Information Infrastructures Security - 11th International\n Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised\n Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {10242},\n pages = {1--12},\n publisher = {Springer},\n year = {2016},\n url = {https://doi.org/10.1007/978-3-319-71368-7\\_1},\n doi = {10.1007/978-3-319-71368-7\\_1},\n timestamp = {Mon, 10 May 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/critis/AbbasiHZE16.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abbasi, A.","Hashemi, M.","Zambon, E.","Etalle, S."],"editor_short":["Havârneanu, G. M.","Setola, R.","Nassopoulos, H.","Wolthusen, S. D."],"key":"DBLP:conf/critis/AbbasiHZE16","id":"DBLP:conf/critis/AbbasiHZE16","bibbaseid":"abbasi-hashemi-zambon-etalle-stealthlowlevelmanipulationofprogrammablelogiccontrollersiobypincontrolexploitation-2016","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-71368-7\\_1"},"metadata":{"authorlinks":{"abbasi, a":"https://homepage.ruhr-uni-bochum.de/Ali.Abbasi-i4q/pub.html"}},"downloads":3},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/73/2297-2.bib","creationDate":"2020-05-01T22:19:37.149Z","downloads":3,"keywords":[],"search_terms":["stealth","low","level","manipulation","programmable","logic","controllers","pin","control","exploitation","abbasi","hashemi","zambon","etalle"],"title":"Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation","year":2016,"dataSources":["mgBXxEwpGG6TrJ3nr","7whi7meiPSmyTF8Y3","4ji2ftG9xHDRDPcZG","9RRnqWppvSHbtx7rD","eqGZWjgQsJSxuxEGv"]}