Industrial control systems security: What is happening? M Krotofil, D Gollmann 2013 11th IEEE International Conference on Industrial Informatics (INDIN …, 2013 | 129 | 2013 |
The process matters: Ensuring data veracity in cyber-physical systems M Krotofil, J Larsen, D Gollmann Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 119 | 2015 |
Attackers deploy new ICS attack framework “TRITON” and cause operational disruption to critical infrastructure B Johnson, D Caban, M Krotofil, D Scali, N Brubaker, C Glyer Threat Research Blog 14, 94, 2017 | 94 | 2017 |
Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks M Krotofil, A Cardenas, J Larsen, D Gollmann International journal of critical infrastructure protection 7 (4), 213-232, 2014 | 92 | 2014 |
Resilience of process control systems to cyber-physical attacks M Krotofil, AA Cárdenas Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013 | 90 | 2013 |
On the significance of process comprehension for conducting targeted ICS attacks B Green, M Krotofil, A Abbasi Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 60 | 2017 |
Cyber-physical systems security: Experimental analysis of a vinyl acetate monomer plant D Gollmann, P Gurikov, A Isakov, M Krotofil, J Larsen, A Winnicki Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 1-12, 2015 | 60 | 2015 |
CPS: Driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals M Krotofil, AA Cárdenas, B Manning, J Larsen Proceedings of the 30th annual computer security applications conference …, 2014 | 55 | 2014 |
Rocking the pocket book: Hacking chemical plants M Krotofil, J Larsen DefCon Conference, DEFCON, 2015 | 53 | 2015 |
Cyber-physical systems security D Gollmann, M Krotofil The new codebreakers: Essays dedicated to David Kahn on the occasion of his …, 2016 | 33 | 2016 |
PCaaD: Towards automated determination and exploitation of industrial systems B Green, R Derbyshire, M Krotofil, W Knowles, D Prince, N Suri Computers & security 110, 102424, 2021 | 26 | 2021 |
Securing industrial control systems M Krotofil, K Kursawe, D Gollmann Security and Privacy Trends in the Industrial Internet of Things, 3-27, 2019 | 22 | 2019 |
Achieving ICS resilience and security through granular data flow management B Green, M Krotofil, D Hutchison Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016 | 22 | 2016 |
Attackers deploy new ICS attack framework B Johnson, D Caban, M Krotofil, D Scali, N Brubaker, C Glyer TRITON” and Cause Operational Disruption to Critical Infrastructure 14, 2017 | 20 | 2017 |
Are you threatening my hazards? M Krotofil, J Larsen International Workshop on Security, 17-32, 2014 | 18 | 2014 |
A rising tide: Design exploits in industrial control systems A Bolshev, J Larsen, M Krotofil, R Wightman 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 16 | 2016 |
Attackers deploy new ics attack framework “TRITON” and cause operational disruption to critical infrastructure. FireEye B Johnson, D Caban, M Krotofil, D Scali, N Brubaker, C Glyer | 11 | 2018 |
Cyber-physical system discovery: Reverse engineering physical processes A Winnicki, M Krotofil, D Gollmann Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 3-14, 2017 | 11 | 2017 |
Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292) M Dacier, F Kargl, H König, A Valdes Dagstuhl Reports 4 (7), 2014 | 8 | 2014 |
Is this a good time? Deciding when to launch attacks on process control systems M Krotofil, ÁA Cárdenas Proceedings of the 3rd international conference on High confidence networked …, 2014 | 7 | 2014 |