Description |
1 online resource |
Series |
IFIP advances in information and communication technology ; 666 |
|
IFIP advances in information and communication technology ; 666.
|
Contents |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure |
|
4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation |
|
3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance |
|
4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements -- References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS |
|
Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke |
Summary |
{\bf CRITICAL INFRASTRUCTURE PROTECTION XVI} Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. {\bf Critical Infrastructure Protection XVI} describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: \begin{itemize} \item Themes and Issues \item Industrial Control Systems Security \item Additive Manufacturing Systems \item Infrastructure Device Security \item Telecommunications Systems Security \end{itemize} This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Sixteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held virtually in the spring of 2022. {\bf Critical Infrastructure Protection XVI} is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. {\bf Jason Staggs} is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. {\bf Sujeet Shenoi} is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA |
Bibliography |
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments |
Notes |
Print version record |
Subject |
Data protection -- Congresses
|
|
Data protection
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Staggs, Jason, editor
|
|
Shenoi, Sujeet, editor.
|
ISBN |
9783031201370 |
|
303120137X |
|
9788303120137 |
|
8303120131 |
|