Limit search to available items
44 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author IFIP Working Group 11.10 on Critical infrastructure Protection. Conference (16th : 2022 : Online)

Title Critical infrastructure protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, virtual event, March 14-15, 2022, revised selected papers / edited by Jason Staggs, Sujeet Shenoi
Published Cham : Springer, 2022

Copies

Description 1 online resource
Series IFIP advances in information and communication technology ; 666
IFIP advances in information and communication technology ; 666.
Contents Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure
4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation
3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance
4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements -- References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS
Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke
Summary {\bf CRITICAL INFRASTRUCTURE PROTECTION XVI} Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. {\bf Critical Infrastructure Protection XVI} describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: \begin{itemize} \item Themes and Issues \item Industrial Control Systems Security \item Additive Manufacturing Systems \item Infrastructure Device Security \item Telecommunications Systems Security \end{itemize} This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Sixteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held virtually in the spring of 2022. {\bf Critical Infrastructure Protection XVI} is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. {\bf Jason Staggs} is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. {\bf Sujeet Shenoi} is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA
Bibliography References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments
Notes Print version record
Subject Data protection -- Congresses
Data protection
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Staggs, Jason, editor
Shenoi, Sujeet, editor.
ISBN 9783031201370
303120137X
9788303120137
8303120131
Other Titles ICCIP 2022