完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTseng, Wan-Hui
dc.contributor.authorFan, Chin-Feng
dc.date.accessioned2009-08-23T04:42:49Z
dc.date.accessioned2020-05-25T06:54:28Z-
dc.date.available2009-08-23T04:42:49Z
dc.date.available2020-05-25T06:54:28Z-
dc.date.issued2007-01-26T03:28:48Z
dc.date.submitted2006-12-04
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/3535-
dc.description.abstractAfter the 911 terrorism attacks, the America government thoroughly investigated the infrastructure environment and found that the automated control system is a vulnerable point. In order to ensure the control system programming security, the malicious program issue must be investigated. Thus, our research focuses on the control system malicious code. This paper classified the malicious code based on control system characteristics. We identified the potential malicious code classifications, such as time-dependent, data-dependent, behavior-dependent, input-dependent, violate a certain theorem, deviation’s error, isolated codes, change of privilege/authentication, anomalous file access, access of text segment as data, and so on. Finally, we develop an example to construct a malicious program on automated control system according to our classification. It demonstrates that the malicious code written by an insider and planted into the control system program is possible. So, this research is the first step towards detecting the malicious code on the control systems.
dc.description.sponsorship元智大學,中壢市
dc.format.extent6p.
dc.format.extent3669531 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2006 ICS會議
dc.subjectcontrol systems security
dc.subjectmalicious code classification
dc.subject.otherEmpirical Software Engineering
dc.titleAnalysis of the Potential Malicious Code on Control Systems
分類:2006年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002006000053.pdf3.58 MBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。