A Survey on Applications of Formal Methods in Analysis of SCADA Systems

被引:0
作者
Marovic, Mihael [1 ]
Derek, Ante [1 ]
Gros, Stjepan [1 ]
机构
[1] Univ Zagreb, Fac Elect Engn & Comp, Lab Informat Secur & Privacy, Unska 3, Zagreb 10000, Croatia
来源
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021 | 2021年 / 13139卷
关键词
SCADA; Formal methods; Verification; Protocols; SECURITY; PROTOCOLS;
D O I
10.1007/978-3-030-93200-8_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this survey is to establish how have the formal methods been applied to Supervisory Control and Data Acquisition (SCADA) systems in order to verify critical properties relevant to SCADA to a high degree of assurance. We analyze and dissect published research that attempts to formally specify and verify SCADA communication protocol or other components relevant and specific to SCADA systems. We identify areas that would benefit most from analysis by formal methods.
引用
收藏
页码:99 / 115
页数:17
相关论文
共 29 条
[1]   Formal modelling and analysis of DNP3 secure authentication [J].
Amoah, Raphael ;
Camtepe, Seyit ;
Foo, Ernest .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :345-360
[2]  
Amoah R, 2014, IEEE ICC, P827, DOI 10.1109/ICC.2014.6883422
[3]  
[Anonymous], 2007, Power Systems Management and Associated Information Exchange-Data and Communications Security Part 1: Communication Network and System SecurityIntroduction to Security Issues
[4]  
Byres E, 2013, COMMUN ACM, V56, P29, DOI 10.1145/2492007.2492018
[5]   Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access [J].
Cheminod, Manuel ;
Pironti, Alfredo ;
Sisto, Riccardo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (01) :30-40
[6]   Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5 [J].
Cremers, Cas ;
Dehnel-Wild, Martin ;
Milner, Kevin .
COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 :389-407
[7]   Formally and practically verifying flow properties in industrial systems [J].
Dreier, Jannik ;
Puys, Maxime ;
Potet, Marie-Laure ;
Lafourcade, Pascal ;
Roch, Jean-Louis .
COMPUTERS & SECURITY, 2019, 86 :453-470
[8]  
Dutertre B, 2008, INT FED INFO PROC, V253, P189
[9]  
Edmonds Janica., 2008, Critical Infrastructure Protection, volume 253 of IFIP International Federation for Information Processing, V253, P205, DOI DOI 10.1007/978-0-387-75462-8_15
[10]   A Survey of Security in SCADA Networks: Current Issues and Future Challenges [J].
Ghosh, Sagarika ;
Sampalli, Srinivas .
IEEE ACCESS, 2019, 7 :135812-135831