TICS: Trusted Industry Control System based on hardware security module

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The new attack technologies have caused great security threats to industry control system, especially APT attacks such as Stuxnet, BlackEnergy, WannaCrypt. Traditional protection methods fail to defend the hackers attacks on the cyber and physical components of ICS. This paper propose an ICS terminal defense solution in establishing the trustworthiness of with trusted execution environment. The check attestation method is employed to optimize ICS software attestation, and the whitelist mechanism is used to enforce the process execution in terminal. We design and implement a trusted terminal defense system in industry control network. The test results shows that the performance of hardware security module and process enforcement meets the real-time requirements. abstract environment.

Cite

CITATION STYLE

APA

Qin, Y., Zhang, Y., & Feng, W. (2017). TICS: Trusted Industry Control System based on hardware security module. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10581 LNCS, pp. 485–493). Springer Verlag. https://doi.org/10.1007/978-3-319-69471-9_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free