In today's reality where sharing equipment between students is a health concern, university courses may be forced to go fully online with short notice, and students may have to quarantine for periods of time, ther...
详细信息
To protect an Industrial Control System (ICS), defenders need to identify potential attacks on the system and then design mechanisms to prevent them. Unfortunately, identifying potential attack conditions is a time-co...
详细信息
The solar tracking system has an automatic movement of solar panel that is able to follow the intensity of the direction of sunlight to increase the power requirement. This paper is focused to develop the Single Axis ...
详细信息
This work focuses on the management of safety constraints for the control of cyber-physical manufacturing systems. A methodology for constructing a set of constraints to ensure the safety of an existing control law is...
详细信息
This work focuses on the management of safety constraints for the control of cyber-physical manufacturing systems. A methodology for constructing a set of constraints to ensure the safety of an existing control law is proposed. The resolution of this constraint set is performed using algebraic synthesis. This tool facilitates the implementation of a logic filter in a way that complies with IEC 61131-3.
The PID controller implementation on the industry is an active area of study, however, according to the technique used is possible not having optimal and good performance due to the difficulties in the process identif...
详细信息
Modern manufacturing system is a highly decentralized manufacturing system, which consists of many intelligent processing machines, material transportation equipment, robots and various manufacturing resources. With t...
详细信息
Hardware security components provide a Root-of-Trust (RoT) environment for critical system operations and bring in a substantially high level of security guarantee since it is protected from various software-based vul...
详细信息
Real-world PLC software is modular and composed of many differentfunction blocks. Nevertheless, common approaches to PLC software verification do notleverage this but resort to inlining, or analyse instances of the sa...
详细信息
Real-world PLC software is modular and composed of many differentfunction blocks. Nevertheless, common approaches to PLC software verification do notleverage this but resort to inlining, or analyse instances of the same functionblock type independently. With the advent of constrained Horn clauses as the basisfor automated program verification, many state-of-the-art verification proceduresbuild upon them. We illustrate how this formalism allows for a uniformcharacterisation of PLC program semantics and safety goals, derived from reactivesystems safety foundations. Furthermore, we give a natural extension of theresulting encoding which enables compositional reasoning about modular software. Dueto the cyclic execution of PLCs, an engineer's mental model of a single functionblock often exhibits state machine semantics - partitioning a block's behaviour intodifferent modes of operation. We illustrate how such a modespace, and similar high-level knowledge, can be integrated with ourcompositional characterisation. We investigate the impact of each technique on themodel checking performance by characterising PLC software verification problems,both in a non-compositional and a compositional way that may incorporate modetransitions, and solving them with an SMT solver. Evaluation of our prototypicalimplementation on examples from the PLCopen Safety library shows the effectivenessof both the chosen formalism and using high-level summaries.
Advances in the processing power and efficiency of computers have led to the proliferation of information technology (IT) systems in nearly every aspect of our daily lives. The pervasiveness and reliance on IT systems...
详细信息
Advances in the processing power and efficiency of computers have led to the proliferation of information technology (IT) systems in nearly every aspect of our daily lives. The pervasiveness and reliance on IT systems, however, have increased the susceptibility to cyber attacks. This is of particular concern with regard to supervisory control and data acquisition (SCADA) systems in the critical infrastructure. Compromises of SCADA systems - in particular, the programmable logic controllers (PLCs) used as field devices to control and monitor remote processes - could have devastating consequences. However, because of their limited onboard computing resources (e.g., processing power and memory), conventional bit-level IT security mechanisms are not well suited to safeguarding PLCs. This paper describes a methodology for detecting anomalous operations of PLCs. The methodology uses information extracted from radio frequency (RF) features to identify changes in operating characteristics due to malicious actions or system failure. The experimental results demonstrate the utility of the RF-based anomaly detection methodology for PLC verification. (C) 2012 Published by Elsevier B.V.
Since programmable logic controllers (PLCs) ushered in Industry 3.0 more than 50 years ago, they have remained one of the cornerstones of automation. PLCs are industrial computers used to control various electro-mecha...
详细信息
Since programmable logic controllers (PLCs) ushered in Industry 3.0 more than 50 years ago, they have remained one of the cornerstones of automation. PLCs are industrial computers used to control various electro-mechanical processes in manufacturing facilities and automation environments.
暂无评论