Learn More
This paper presents a new vulnerability assessment model based on timing attacks. In particular, it examines the problem where an adversary has access to a certain sensor reading or a controller output signal in real time, but can only cause denial of service (DoS). Jamming the communications to a device can cause the system to work with stale data that, in(More)
Cyber-physical systems are characterized by an IT infrastructure controlling effects in the physical world. Attacks are intentional actions trying to cause undesired physical effects. When process data originating in the physical world is manipulated before being handed to the IT infrastructure, the data security property called "veracity" or(More)
The avian retrovirus oncogene v-ski was analysed for its ability to alter the differentiation program of erythroid cells and to cooperate with tyrosine kinase oncogenes in leukemogenesis. For this, a retrovirus combining v-ski with a temperature-sensitive version of the v-sea oncogene was constructed. In transformed erythroblasts, v-ski disturbed the(More)
The effect of the v-ski oncogene on the transformation of chicken hematopoietic cells was examined. In initial experiments viruses encoding the v-ski oncoprotein did not transform chicken bone marrow cells. However, whereas viruses encoding the ts-v-sea oncoprotein transform solely erythroid cells, viruses encoding both the v-ski and the ts-v-sea oncogenes(More)
DoS attacks on sensor measurements used for industrial control can cause the controller of the process to use <i>stale data</i>. If the DoS attack is not timed properly, the use of stale data by the controller will have limited impact on the process; however, if the attacker is able to launch the DoS attack at the correct time, the use of stale data can(More)
We describe an approach for analysing and attacking the physical part (a process) of a cyber-physical system. The stages of this approach are demonstrated in a case study, a simulation of a vinyl acetate monomer plant. We want to demonstrate in particular where security has to rely on expert knowledge in the domain of the physical components and processes(More)
Security is an emergent property. It is the outcome of an interaction between many sub-components and processes. One of the biggest problems of ICS security today is that systems undergo security assessments without recognizing the environment in which they are used. This has led to a situation where many systems have undergone cyber security assessments(More)
The D14S7 locus defines the breakpoint on chromosome 14 of a t (8;14) (q24;q11) present in the T-cell line KE37-R in which DI4S7 sequences translocate 3' to the c-myc oncogene. It has been shown previously that DI4S7 rearranges specifically in some but not all T cell clones and in the present study we investigated the frequency and specificity of its(More)