top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Infrastructure Protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 306 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computers and civilization
Data mining
Data and Information Security
Legal Aspects of Computing
Computers and Society
Data Mining and Knowledge Discovery
ISBN 3-030-04537-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910303450703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVI, 328 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers - Law and legislation
Information technology - Law and legislation
Computer networks
Software engineering
Application software
Data and Information Security
Legal Aspects of Computing
Computer Communication Networks
Software Engineering
Computer and Information Systems Applications
ISBN 3-030-34647-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910357849303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection XIV : 14th IFIP WG 11. 10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, revised selected papers / / Jason Staggs, Sujeet Shenoi (editors)
Critical infrastructure protection XIV : 14th IFIP WG 11. 10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, revised selected papers / / Jason Staggs, Sujeet Shenoi (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVI, 331 p. 112 illus.)
Disciplina 005.8
Collana IFIP advances in information and communication technology
Soggetto topico Computer networks - Security measures
ISBN 3-030-62840-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Record Nr. UNISA-996465464203316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVI, 331 p. 112 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Application software
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer and Information Systems Applications
Computer Communication Networks
Legal Aspects of Computing
ISBN 3-030-62840-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Record Nr. UNINA-9910447243003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection XV : 15th IFIP WG 11.10 International Conference, ICCIP 2021, virtual event, March 15-16, 2021 : revised selected papers / / Jason Staggs and Sujeet Shenoi, editors
Critical infrastructure protection XV : 15th IFIP WG 11.10 International Conference, ICCIP 2021, virtual event, March 15-16, 2021 : revised selected papers / / Jason Staggs and Sujeet Shenoi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (256 pages)
Disciplina 004.6
Collana IFIP advances in information and communication technology
Soggetto topico Computer networks
ISBN 3-030-93511-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Critical infrastructure protection 15
Critical infrastructure protection fifteen
Record Nr. UNINA-9910523742603321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical infrastructure protection XV : 15th IFIP WG 11.10 International Conference, ICCIP 2021, virtual event, March 15-16, 2021 : revised selected papers / / Jason Staggs and Sujeet Shenoi, editors
Critical infrastructure protection XV : 15th IFIP WG 11.10 International Conference, ICCIP 2021, virtual event, March 15-16, 2021 : revised selected papers / / Jason Staggs and Sujeet Shenoi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (256 pages)
Disciplina 004.6
Collana IFIP advances in information and communication technology
Soggetto topico Computer networks
ISBN 3-030-93511-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Critical infrastructure protection 15
Critical infrastructure protection fifteen
Record Nr. UNISA-996464546503316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Critical infrastructure protection XVI : 16th IFIP WG 11. 10 International Conference, ICCIP 2022, virtual event, March 14-15, 2022, revised selected papers. / / Jason Staggs, Sujeet Shenoi, editors
Critical infrastructure protection XVI : 16th IFIP WG 11. 10 International Conference, ICCIP 2022, virtual event, March 14-15, 2022, revised selected papers. / / Jason Staggs, Sujeet Shenoi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (303 pages)
Disciplina 005.8
Collana IFIP advances in information and communication technology
Soggetto topico Data protection
ISBN 3-031-20137-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure -- 4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation -- 3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance -- 4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements.
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments.
6.3 Infill Exclusion Experiments -- 6.4 Discussion -- 7. Mitigations -- 8. Conclusions -- Acknowledgement -- References -- Chapter 7 DETECTING PART ANOMALIES INDUCED BY CYBER ATTACKS ON A POWDER BED FUSION ADDITIVE MANUFACTURING SYSTEM -- 1. Introduction -- 2. Related Work -- 3. Powder Bed Fusion -- 3.1 Powder Bed Fusion Process -- 3.2 Selective Laser Sintering Printer -- 4. Powder Bed Fusion Printer Anomalies -- 5. Anomaly Detection Method -- 5.1 Data Collection -- 5.2 Data Processing -- 5.3 Data Analysis -- 6. Anomaly Creation Attacks -- 7. Experimental Setup and Results -- 7.1 Experimental Setup -- 7.2 Anomaly Detection Results -- 8. Discussion -- 9. Conclusions -- Acknowledgement -- References -- Chapter 8 LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS -- 1. Introduction -- 2. Related Work -- 3. Low-Magnitude Infill Structure Attacks -- 3.1 Attack Success Criteria -- 3.2 Printing Accuracy -- 3.3 Attacking Infill Structures -- 4. Attack Implementation -- 4.1 Attack Overview -- 4.2 Attack Plan -- 5. Evaluation Results -- 5.1 Stealthiness Performance -- 5.2 Mechanical Strength Impacts -- 6. Analysis and Discussion -- 7. Attack Countermeasures -- 8. Conclusions -- Acknowledgement -- References -- IV INFRASTRUCTURE DEVICE SECURITY -- Chapter 9 LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING -- 1. Introduction -- 2. Background and Related Work -- 2.1 Confidential Computing -- 2.2 RISC-V Instruction Set Architecture -- 2.3 Keystone Enclave -- 2.4 Related Work -- 3. Experimental Configuration -- 4. Proposed Development -- 5. Experimental Results and Analysis -- 6. Conclusions -- References -- Chapter 10 EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE -- 1. Introduction -- 2. Background -- 2.1 Talos II Architecture -- 2.2 PNOR Image Structure.
2.3 Initial Program Load -- 2.4 Ciphers -- 2.5 Secure Key Management -- 3. Related Work -- 3.1 Secure Firmware Updates Using AES -- 3.2 Image Encryption -- 4. Experimental Setup -- 4.1 Microcontroller Setup -- 5. Experimental Methodology -- 5.1 Experimental Factors -- 5.2 Data Collection -- 5.3 Application Scenarios -- 5.4 Assumptions -- 6. Experimental Results and Analysis -- 6.1 Boot Image Encryption Performance Impact -- 6.2 Comparison of Encryption Methods -- 6.3 Encryption Ratio -- 7. Conclusions -- References -- V TELECOMMUNICATIONS SYSTEMS SECURITY -- Chapter 11 SECURING INFINIBAND TRAFFIC WITH BLUEFIELD-2 DATA PROCESSING UNITS -- 1. Introduction -- 2. Background and Related Work -- 2.1 InfiniBand Network Overview -- 2.2 Convergent Technologies -- 2.3 Security Concepts -- 3. Testbed Design -- 4. Experimental Scenarios -- 5. Experimental Results -- 6. Conclusions -- References.
Record Nr. UNISA-996499859203316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (303 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-20137-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure -- 4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation -- 3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance -- 4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements.
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments.
6.3 Infill Exclusion Experiments -- 6.4 Discussion -- 7. Mitigations -- 8. Conclusions -- Acknowledgement -- References -- Chapter 7 DETECTING PART ANOMALIES INDUCED BY CYBER ATTACKS ON A POWDER BED FUSION ADDITIVE MANUFACTURING SYSTEM -- 1. Introduction -- 2. Related Work -- 3. Powder Bed Fusion -- 3.1 Powder Bed Fusion Process -- 3.2 Selective Laser Sintering Printer -- 4. Powder Bed Fusion Printer Anomalies -- 5. Anomaly Detection Method -- 5.1 Data Collection -- 5.2 Data Processing -- 5.3 Data Analysis -- 6. Anomaly Creation Attacks -- 7. Experimental Setup and Results -- 7.1 Experimental Setup -- 7.2 Anomaly Detection Results -- 8. Discussion -- 9. Conclusions -- Acknowledgement -- References -- Chapter 8 LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS -- 1. Introduction -- 2. Related Work -- 3. Low-Magnitude Infill Structure Attacks -- 3.1 Attack Success Criteria -- 3.2 Printing Accuracy -- 3.3 Attacking Infill Structures -- 4. Attack Implementation -- 4.1 Attack Overview -- 4.2 Attack Plan -- 5. Evaluation Results -- 5.1 Stealthiness Performance -- 5.2 Mechanical Strength Impacts -- 6. Analysis and Discussion -- 7. Attack Countermeasures -- 8. Conclusions -- Acknowledgement -- References -- IV INFRASTRUCTURE DEVICE SECURITY -- Chapter 9 LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING -- 1. Introduction -- 2. Background and Related Work -- 2.1 Confidential Computing -- 2.2 RISC-V Instruction Set Architecture -- 2.3 Keystone Enclave -- 2.4 Related Work -- 3. Experimental Configuration -- 4. Proposed Development -- 5. Experimental Results and Analysis -- 6. Conclusions -- References -- Chapter 10 EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE -- 1. Introduction -- 2. Background -- 2.1 Talos II Architecture -- 2.2 PNOR Image Structure.
2.3 Initial Program Load -- 2.4 Ciphers -- 2.5 Secure Key Management -- 3. Related Work -- 3.1 Secure Firmware Updates Using AES -- 3.2 Image Encryption -- 4. Experimental Setup -- 4.1 Microcontroller Setup -- 5. Experimental Methodology -- 5.1 Experimental Factors -- 5.2 Data Collection -- 5.3 Application Scenarios -- 5.4 Assumptions -- 6. Experimental Results and Analysis -- 6.1 Boot Image Encryption Performance Impact -- 6.2 Comparison of Encryption Methods -- 6.3 Encryption Ratio -- 7. Conclusions -- References -- V TELECOMMUNICATIONS SYSTEMS SECURITY -- Chapter 11 SECURING INFINIBAND TRAFFIC WITH BLUEFIELD-2 DATA PROCESSING UNITS -- 1. Introduction -- 2. Background and Related Work -- 2.1 InfiniBand Network Overview -- 2.2 Convergent Technologies -- 2.3 Security Concepts -- 3. Testbed Design -- 4. Experimental Scenarios -- 5. Experimental Results -- 6. Conclusions -- References.
Record Nr. UNINA-9910633936603321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (X, 253 p. 84 illus., 7 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Computer Engineering and Networks
Legal Aspects of Computing
ISBN 3-031-49585-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks.
Record Nr. UNINA-9910799493803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui