, ANSSI. Managing cybersecurity for ICS, 2012.
The AVISPA tool for the automated validation of internet security protocols and applications, CAV'05, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
A novel approach for reasoning about liveness in cryptographic protocols and its application to fair exchange, pp.76-91, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01396282
An on-the-fly model-checker for security protocol analysis, ESORICS'03, 2003. ,
An efficient cryptographic protocol verifier based on Prolog rules, CSFW'01, 2001. ,
Implementing a vertically hardened dnp3 control stack for power applications, ICSS'16, pp.45-53, 2016. ,
A comparison of commercial and military computer security policies, Security and Privacy, 1987 IEEE Symposium on, pp.184-184, 1987. ,
Practical modern SCADA protocols: DNP3, 60870.5 and related systems, 2004. ,
The Scyther Tool: Verification, falsification, and analysis of security protocols, CAV'08, 2008. ,
Automated analysis and verification of TLS 1.3: 0-rtt, resumption and delayed authentication, SP'16, 2016. ,
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981. ,
Formal verification of e-auction protocols, POST'13, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01338031
Formally verifying flow integrity properties in industrial systems, SECRYPT'17, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01959766
Formal modeling and analysis of the MODBUS protocol, Critical Infrastructure Protection, pp.189-204, 2007. ,
Security for industrial communication systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005. ,
Design and implementation of a secure MODBUS protocol, IFIP AICT'09, 2009. ,
Securing MODBUS transactions using hash-based message authentication codes and stream transmission control protocol, IC-CIT'13, 2013. ,
The slam calculus: programming with secrecy and integrity, POPL'98, 1998. ,
Industrial communication networks -High availability automation networks -Part 3: Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR), 2016. ,
Analysis of an electronic voting protocol in the applied pi-calculus, ESOP'05, 2005. ,
Performance evaluations of cryptographic protocols. verification tools dealing with algebraic properties, FPS 2015, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01306395
Stuxnet: Dissecting a cyberwarfare weapon, Security & Privacy, vol.9, issue.3, pp.49-51, 2011. ,
A hierarchy of authentication specifications, CSFW '97, 1997. ,
The TAMARIN prover for the symbolic analysis of security protocols, CAV'13, 2013. ,
, MODBUS messaging on TCP/IP implementation guide v1.0a, 2004.
, , 2012.
Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007. ,
Hammer parser generator ,
Formal analysis of security properties on the OPC-UA SCADA protocol, SAFECOMP'16, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01366059
SPEAR II -the security protocol engineering and analysis resource, 1999. ,
Automated analysis of diffiehellman protocols and advanced security properties, CSF'12, 2012. ,
Guide to industrial control systems (ICS) security. NIST special publication, vol.800, pp.16-16, 2011. ,
A formal verification methodology for checking data integrity, DATE'05, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00181863
The study of security issues for the industrial control systems communication protocols, JIMET, vol.15, 2015. ,