Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Federico Griscioli"'
Autor:
Maurizio Pizzonia, Federico Griscioli
Publikováno v:
Journal of Computer Security. 29:51-76
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known to exploit USB thumb drives as an effective spreading vector. In ICSes, thumb drives are widely used to transfer files a
Public cloud storage services are widely adopted for their scalability and low cost. However, delegating the management of the storage has serious implications from the security point of view. We focus on integrity verification of query results based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c0ad91de18cea41e30fe76af3455ed1
https://hdl.handle.net/11590/355006
https://hdl.handle.net/11590/355006
Autor:
Elisa Costante, Gladys León, Xavier Clotet, David Lund, Estefanía Etchevés Miciolino, Federico Griscioli, Fatai Babatunde Kassim, Dario Di Noto, Jörg Kippe, Maurizio Pizzonia, Steffen Pfrang
Cyber-security of industrial control systems (ICSs) is notoriously hard due to the peculiar constraints of the specific context. At the same time, the use of specifically crafted malware to target ICSs is an established offensive mean for opposing or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::92b2d4bd4c0815cf6657547141328f5c
https://publica.fraunhofer.de/handle/publica/252353
https://publica.fraunhofer.de/handle/publica/252353
Autor:
Gabriele Lospoto, Massimo Rimondini, Federico Griscioli, Habib Mostafaei, Roberto di Lallo, Maurizio Pizzonia
Publikováno v:
IM
In critical infrastructures, communication networks are used to exchange vital data among elements of Industrial Control Systems (ICSes). Due to the criticality of such systems and the increase of the cybersecurity risks in these contexts, best pract
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::802beda21a58d0c59e6557225731ac05
https://hdl.handle.net/11590/317136
https://hdl.handle.net/11590/317136
Autor:
Federico Griscioli, Maurizio Pizzonia
Publikováno v:
PST
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known to exploit USB thumb drives as an effective spreading vector. In ICSes, these devices are widely used to transfer files
Publikováno v:
PST
The BadUSB attack leverages the modification of firmware of USB devices in order to mimic the behaviour of a keyboard or a mouse and send malicious commands to the host. This is a new and dreadful threat for any organization. Current countermeasures
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6bcc32cd450446eb112ec120c66fb141
https://hdl.handle.net/11590/317088
https://hdl.handle.net/11590/317088