The use of attack trees in assessing vulnerabilities in SCADA systems. Byres, E. J., Franz, M., & Miller, D. In Proceedings of the International Infrastructure Survivability Workshop, of IISW'04, Lisbon, Portugal, December, 2004. Citeseer. 00098
Paper abstract bibtex Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.
@inproceedings{byres_use_2004,
address = {Lisbon, Portugal},
series = {{IISW}'04},
title = {The use of attack trees in assessing vulnerabilities in {SCADA} systems},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.466.1887&rep=rep1&type=pdf},
abstract = {Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.},
urldate = {2015-10-05TZ},
booktitle = {Proceedings of the {International} {Infrastructure} {Survivability} {Workshop}},
publisher = {Citeseer},
author = {Byres, Eric J. and Franz, Matthew and Miller, Darrin},
month = dec,
year = {2004},
note = {00098},
keywords = {SCADA, SCADA control system, SCADA system security, SCADA systems, supervisory control and data-acquisition (SCADA) systems}
}
Downloads: 0
{"_id":"8Z8CaC6WQ75ahvcbE","bibbaseid":"byres-franz-miller-theuseofattacktreesinassessingvulnerabilitiesinscadasystems-2004","downloads":0,"creationDate":"2015-10-05T19:53:11.887Z","title":"The use of attack trees in assessing vulnerabilities in SCADA systems","author_short":["Byres, E. J.","Franz, M.","Miller, D."],"year":2004,"bibtype":"inproceedings","biburl":"https://api.zotero.org/users/2345845/collections/WG9KFXBW/items?key=9zfUPfSwh2adWPrQ5jSqh7vN&format=bibtex&limit=100i","bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Lisbon, Portugal","series":"IISW'04","title":"The use of attack trees in assessing vulnerabilities in SCADA systems","url":"http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.466.1887&rep=rep1&type=pdf","abstract":"Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.","urldate":"2015-10-05TZ","booktitle":"Proceedings of the International Infrastructure Survivability Workshop","publisher":"Citeseer","author":[{"propositions":[],"lastnames":["Byres"],"firstnames":["Eric","J."],"suffixes":[]},{"propositions":[],"lastnames":["Franz"],"firstnames":["Matthew"],"suffixes":[]},{"propositions":[],"lastnames":["Miller"],"firstnames":["Darrin"],"suffixes":[]}],"month":"December","year":"2004","note":"00098","keywords":"SCADA, SCADA control system, SCADA system security, SCADA systems, supervisory control and data-acquisition (SCADA) systems","bibtex":"@inproceedings{byres_use_2004,\n\taddress = {Lisbon, Portugal},\n\tseries = {{IISW}'04},\n\ttitle = {The use of attack trees in assessing vulnerabilities in {SCADA} systems},\n\turl = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.466.1887&rep=rep1&type=pdf},\n\tabstract = {Protocol standards, particularly those in the controls and power industry, have traditionally been designed to address a specific application with little regard for security in their design or specification. At best, there has been only passing concern for security issues that may arise in deployment; at worst, protocol designers assume a closed (and therefore secure) environment, which, in many cases, no longer exists. Where security has been a consideration, there has been no clear methodology to assess the security risks in the protocol specification. This paper describes the application of attack tree methodology to the common SCADA protocol MODBUS/TCP with the goal of identifying security vulnerabilities inherent in the specification and in typical deployments.},\n\turldate = {2015-10-05TZ},\n\tbooktitle = {Proceedings of the {International} {Infrastructure} {Survivability} {Workshop}},\n\tpublisher = {Citeseer},\n\tauthor = {Byres, Eric J. and Franz, Matthew and Miller, Darrin},\n\tmonth = dec,\n\tyear = {2004},\n\tnote = {00098},\n\tkeywords = {SCADA, SCADA control system, SCADA system security, SCADA systems, supervisory control and data-acquisition (SCADA) systems}\n}\n\n","author_short":["Byres, E. J.","Franz, M.","Miller, D."],"key":"byres_use_2004","id":"byres_use_2004","bibbaseid":"byres-franz-miller-theuseofattacktreesinassessingvulnerabilitiesinscadasystems-2004","role":"author","urls":{"Paper":"http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.466.1887&rep=rep1&type=pdf"},"keyword":["SCADA","SCADA control system","SCADA system security","SCADA systems","supervisory control and data-acquisition (SCADA) systems"],"downloads":0},"search_terms":["use","attack","trees","assessing","vulnerabilities","scada","systems","byres","franz","miller"],"keywords":["scada","scada control system","scada system security","scada systems","supervisory control and data-acquisition (scada) systems"],"authorIDs":[],"dataSources":["5wuvXcjZdiAp3GLdi"]}