Detailed Information

Cited 2 time in webofscience Cited 5 time in scopus
Metadata Downloads

Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Joo-Chan-
dc.contributor.authorChoi, Hyun-Pyo-
dc.contributor.authorKim, Jang-Hoon-
dc.contributor.authorKim, Jun-Won-
dc.contributor.authorJung, Da-Un-
dc.contributor.authorShin, Ji-Ho-
dc.contributor.authorSeo, Jung-Taek-
dc.date.available2021-03-02T07:40:22Z-
dc.date.created2021-03-02-
dc.date.issued2020-07-
dc.identifier.issn1546-2218-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/80188-
dc.description.abstractCyberattacks on the Industrial Control System (ICS) have recently been increasing, made more intelligent by advancing technologies. As such, cybersecurity for such systems is attracting attention. As a core element of control devices, the Programmable Logic Controller (PLC) in an ICS carries out on-site control over the ICS. A cyberattack on the PLC will cause damages on the overall ICS, with Stuxnet and Duqu as the most representative cases. Thus, cybersecurity for PLCs is considered essential, and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks. In this study, a vulnerability analysis was conducted on the XGB PLC. Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack, memory modulation attack, and FTP/Web service account theft for the verification of the results. Based on the results, the attacks were proven to be able to cause the PLC to malfunction and disable it, and the identified vulnerabilities were defined.-
dc.language영어-
dc.language.isoen-
dc.publisherTECH SCIENCE PRESS-
dc.relation.isPartOfCMC-COMPUTERS MATERIALS & CONTINUA-
dc.titleIdentifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000552255300004-
dc.identifier.doi10.32604/cmc.2020.011251-
dc.identifier.bibliographicCitationCMC-COMPUTERS MATERIALS & CONTINUA, v.65, no.1, pp.53 - 67-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85090863163-
dc.citation.endPage67-
dc.citation.startPage53-
dc.citation.titleCMC-COMPUTERS MATERIALS & CONTINUA-
dc.citation.volume65-
dc.citation.number1-
dc.contributor.affiliatedAuthorSeo, Jung-Taek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorIndustrial control system-
dc.subject.keywordAuthorprogrammable logic controller-
dc.subject.keywordAuthorcybersecurity-
dc.subject.keywordAuthornetwork protocol-
dc.subject.keywordAuthorvulnerability-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE