, ANSSI. Managing cybersecurity for ICS, 2012.

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA tool for the automated validation of internet security protocols and applications, CAV'05, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000408

M. Backes, J. Dreier, S. Kremer, and R. Künnemann, A novel approach for reasoning about liveness in cryptographic protocols and its application to fair exchange, pp.76-91, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01396282

D. Basin, S. Mödersheim, and L. Viganò, An on-the-fly model-checker for security protocol analysis, ESORICS'03, 2003.

B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, CSFW'01, 2001.

S. Bratus, A. J. Crain, S. M. Hallberg, D. P. Hirsch, M. L. Patterson et al., Implementing a vertically hardened dnp3 control stack for power applications, ICSS'16, pp.45-53, 2016.

D. D. Clark and D. R. Wilson, A comparison of commercial and military computer security policies, Security and Privacy, 1987 IEEE Symposium on, pp.184-184, 1987.

G. R. Clarke, D. Reynders, and E. Wright, Practical modern SCADA protocols: DNP3, 60870.5 and related systems, 2004.

C. Cremers, The Scyther Tool: Verification, falsification, and analysis of security protocols, CAV'08, 2008.

C. Cremers, M. Horvat, S. Scott, and T. Van-der-merwe, Automated analysis and verification of TLS 1.3: 0-rtt, resumption and delayed authentication, SP'16, 2016.

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981.

J. Dreier, P. Lafourcade, and Y. Lakhnech, Formal verification of e-auction protocols, POST'13, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01338031

J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch, Formally verifying flow integrity properties in industrial systems, SECRYPT'17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01959766

B. Dutertre, Formal modeling and analysis of the MODBUS protocol, Critical Infrastructure Protection, pp.189-204, 2007.

D. Dzung, M. Naedele, T. Hoff, and M. Crevatin, Security for industrial communication systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005.

I. Fovino, A. Carcano, M. Masera, and A. Trombetta, Design and implementation of a secure MODBUS protocol, IFIP AICT'09, 2009.

G. Hayes and K. El-khatib, Securing MODBUS transactions using hash-based message authentication codes and stream transmission control protocol, IC-CIT'13, 2013.

N. Heintze and J. G. Riecke, The slam calculus: programming with secrecy and integrity, POPL'98, 1998.

. Iec-62439, Industrial communication networks -High availability automation networks -Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR), 2016.

S. Kremer and M. D. Ryan, Analysis of an electronic voting protocol in the applied pi-calculus, ESOP'05, 2005.

P. Lafourcade and M. Puys, Performance evaluations of cryptographic protocols. verification tools dealing with algebraic properties, FPS 2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01306395

R. Langner, Stuxnet: Dissecting a cyberwarfare weapon, Security & Privacy, vol.9, issue.3, pp.49-51, 2011.

G. Lowe, A hierarchy of authentication specifications, CSFW '97, 1997.

S. Meier, B. Schmidt, C. Cremers, and D. Basin, The TAMARIN prover for the symbolic analysis of security protocols, CAV'13, 2013.

M. Ida, MODBUS messaging on TCP/IP implementation guide v1.0a, 2004.

. Opc-ua, , 2012.

S. C. Patel and Y. Yu, Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007.

M. Patterson and D. Hirsch, Hammer parser generator

M. Puys, M. Potet, and P. Lafourcade, Formal analysis of security properties on the OPC-UA SCADA protocol, SAFECOMP'16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01366059

E. Saul and A. Hutchison, SPEAR II -the security protocol engineering and analysis resource, 1999.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated analysis of diffiehellman protocols and advanced security properties, CSF'12, 2012.

K. Stouffer, J. Falco, and S. Karen, Guide to industrial control systems (ICS) security. NIST special publication, vol.800, pp.16-16, 2011.

Y. Umezawa and T. Shimizu, A formal verification methodology for checking data integrity, DATE'05, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00181863

Q. Wanying, W. Weimin, Z. Surong, and Z. Yan, The study of security issues for the industrial control systems communication protocols, JIMET, vol.15, 2015.