Executing Hardware-in-the-Loop (HiL) tests means to compare the actual behavior of a System Under Test (SUT) against a specification of its desired behavior, specified by the tester. The behavior of the SUT is availab...
详细信息
This paper is a part of a project aiming to develop supervisor and monitoring devices for embedded systems in airplanes and vehicles. It focuses on the reliability of these systems and establishes a monitoring framewo...
详细信息
programmable logic controllers (PLCs) are increasingly connected and integrated into the Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined control process. But in fact, this...
详细信息
programmable logic controllers (PLCs) are increasingly connected and integrated into the Industrial Internet of Things (IIoT) for a better network connectivity and a more streamlined control process. But in fact, this brings also its security challenges and exposes them to various cyber-attacks targeting the physical process controlled by such devices. In this work, we investigate whether the newest S7 PLCs are vulnerable by design and can be exploited. In contrast to the typical control logic injection attacks existing in the research community, which require from adversaries to be online along the ongoing attack, this article introduces a new exploit strategy that aims at disrupting the physical process controlled by the infected PLC when adversaries are not connected neither to the target nor to its network at the point zero for the attack. Our exploit approach is comprised of two steps: 1) Patching the PLC with a malicious Time-of-Day interrupt block once an attacker gains access to an exposed PLC, 2) Triggering the interrupt at a later time on the attacker will, when he is disconnected to the system's network. For a real attack scenario, we implemented our attack approach on a Fischertechnik training system based on S7-1500 PLC using the latest version of S7CommPlus protocol. Our experimental results showed that we could keep the patched interrupt block in idle mode and hidden in the PLC memory for a long time without being revealed before being activated at the specific date and time that the attacker defined. Finally, we suggested some potential security recommendations to protect industrial environments from such a threat.
Real-time simulation plays an important role not only in the design and commissioning of new control strategies, but also in training the operators before the actual system is installed. There are in the market severa...
详细信息
This paper describes the design of a fire warning system for the purpose of preventing accidents such as fires in integrated pipe gallery. The sensor is used to monitor the internal environmental parameters of the pip...
详细信息
The paper is about proposal battery discharging station for automotive using by CHAdeMO standard. The article talks about this and other types of electric batteries sockets for electric cars. The main aim of this pape...
详细信息
The Year 2000 bug (Y2K or millennium bug) is touted as modern automation's biggest glitch, and the people most proactively addressing the issue are those associated with the upper-level business systems. Unfortuna...
详细信息
The Year 2000 bug (Y2K or millennium bug) is touted as modern automation's biggest glitch, and the people most proactively addressing the issue are those associated with the upper-level business systems. Unfortunately, many people do not associate software programming with plant-floor control systems. The process of performing a detailed compliance assessment of plant-floor software and addressing the problem if there are any can be organized into: assessment (project setup and system inventory);analysis (suspect and impact), conversion planning (project planning);and implementation (project execution and testing/commissioning).
When a model checker detects a violation of an all-quantified specification, it generates a counterexample trace that explains how to reach a violating state. In the context of PLCs, the counterexample contains the re...
详细信息
A novel microbial phospholipase C (PLC) from Bacillus licheniformis MTCC 7445 was purified to homogeneity by ammonium sulphate fractionation, dialysis, anion exchange chromatography and gel exclusion chromatography. T...
详细信息
A novel microbial phospholipase C (PLC) from Bacillus licheniformis MTCC 7445 was purified to homogeneity by ammonium sulphate fractionation, dialysis, anion exchange chromatography and gel exclusion chromatography. The bacteria growing on vegetable oils secreted significantly high amount of PLC. The enzyme was purified to 23.4-fold with 46% recovery and specific activity 398 U/mg. It exhibited optimum activity at 70 degrees C and pH 10.0. Using diphosphatidylglycerol as substrate the PLC of B. licheniformis MTCC 7445 had a V-max and K-m of 0.68 mM/min and 32 mM, respectively. It hydrolyzed phosphatidylinositol and phosphatidylserine as well as phosphatidylcholine but not other glycerophospholipids. Its activity was enhanced by 113% with Mn2+ and 110% with Mg2+. During degumming of vegetable oils with this enzyme preparation, the phosphorus content of the oil became lower than 4 mg/kg after 5 h of enzyme treatment at 40 degrees C. The novel PLC from B. licheniformis MTCC 7445 is potentially useful for the refining of high quality oils with 95% removal of phospholipids with attractive yield.
A new approach to constructing reliable discrete PLC-programs with timers-programming based on specification and verification-is proposed. Timers are modelled in a discrete way. For the specification of the program be...
详细信息
A new approach to constructing reliable discrete PLC-programs with timers-programming based on specification and verification-is proposed. Timers are modelled in a discrete way. For the specification of the program behavior we use the linear-time temporal logic LTL. Programming is carried out in the ST-language according to an LTL-specification. A new approach to programming PLC is shown by an example. The proposed programming approach provides an ability of a correctness analysis of PLC-programs using the model checking method. The programming requires fulfillment of the following two conditions: (1) the value of each variable should be changed not more than once per one full PLC-program implementation (per one full working cycle of PLC);(2) the value of each variable should only be changed in one place of a PLC-program. Under the proposed approach the change of the value of each program variable is described by a pair of LTL-formulas. The first LTL-formula describes situations that increase the value of the corresponding variable, the second LTL-formula specifies conditions leading to a decrease of the variable value. The LTL-formulas (used for specification of the corresponding variable behavior) are constructive in the sense that they construct the PLC-program, which satisfies temporal properties expressed by these formulas. Thus, the programming of PLC is reduced to the construction of LTL-specification of the behavior of each program variable.
暂无评论