1,191
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Investigating the Applicability of a Moving Target Defense for SCADA Systems

      Published
      proceedings-article
      , , , ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
      17 - 18 September 2015
      security, network security, moving target defense, diversity defense, software vulnerability mitigation
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 107-110
            Affiliations
            [0001]University of South Alabama
            Article
            10.14236/ewic/ICS2015.14
            d9c92c2c-e47c-4201-b128-7d0ccaeacb73
            © Davidson et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2015.14
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            security,diversity defense,network security,software vulnerability mitigation,moving target defense

            References

            1. 2014 Software security and randomization through program partitioning and circuit variation Proceedings of the 1st ACM Workshop on Moving Target Defense ACM

            2. 2003 Randomized instruction set emulation to disrupt binary code injection attacks Proceedings of the 10th ACM Conference on Computer and Communications Security ACM

            3. 2008 Data randomization MS Research. Available from http://research. microsoft.com/apps/pubs/default.aspx?id=70626 Sep 23 2014

            4. 2011 MT6D: A moving target IPv6 defense IEEE Military Communications Conference (MILCOM 2011 1321 1326

            5. EOP NSTC 2011 Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program Available from http://www.whitehouse.gov/sites/default/ files/microsites/ostp/fed_cybersecurity_rd_strate gic_plan_2011.pdf March 19 2015

            6. , and 2014 Evolutionary based moving target cyber defense Proceedings of the 2014 Conference Companion on Genetic and Evolutionary Computation Companion ACM 1261 1268

            7. 2005 Securing SCADA Systems New York Wiley Publishing

            8. 2004 On the effectiveness of address-space randomization Proceedings of the 11th ACM Conference on Computer and Comm Security ACM 298 307

            9. 2015 A language for describing attacks on cyber-physical systems Int. J. Critical Infrastruct. Protection 8 40 52

            Comments

            Comment on this article