{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:51:13Z","timestamp":1742993473695,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_20","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"239-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Access Control and Availability Vulnerabilities in the ISO\/IEC 61850 Substation Automation Protocol"],"prefix":"10.1007","author":[{"given":"James G.","family":"Wright","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"20_CR1","unstructured":"NERC implementation plan for cyber security standards CIP-002-1 through CIP-009-1. Technical report, NERC, 2006"},{"issue":"2","key":"20_CR2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30(2), 323\u2013342 (1983)","journal-title":"J. ACM"},{"issue":"2","key":"20_CR3","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"20_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-04798-5_5","volume-title":"Critical Infrastructure Protection III","author":"S East","year":"2009","unstructured":"East, S., Butts, J., Papa, M., Shenoi, S.: A taxonomy of attacks on the DNP3 protocol. In: Palmer, C., Shenoi, S. (eds.) ICCIP 2009. IAICT, vol. 311, pp. 67\u201381. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04798-5_5"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Elgargouri, A., Virrankoski, R., Elmusrati, M.: IEC 61850 based smart grid security. In: 2015 IEEE International Conference on Industrial Technology (ICIT), pp. 2461\u20132465, March 2015","DOI":"10.1109\/ICIT.2015.7125460"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Hoyos, J., Dehus, M., Brown, T.X.: Exploiting the GOOSE protocol: a practical attack on cyber-infrastructure. In: 2012 IEEE Globecom Workshops, pp. 1508\u20131513, December 2012","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: 37th Annual Conference on IEEE Industrial Electronics Society, IECON 2011, pp. 4490\u20134494, November 2011","DOI":"10.1109\/IECON.2011.6120048"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., Jin, Y.: Cyber-physical systems: a security perspective. In: 2015 20th IEEE European Test Symposium (ETS), pp. 1\u20138, May 2015","DOI":"10.1109\/ETS.2015.7138763"},{"key":"20_CR9","unstructured":"Kush, N., Ahmed, E., Branagan, M., Foo, E.: Poisoned GOOSE: exploiting the GOOSE protocol. In: Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014, Darlinghurst, Australia, vol. 149, pp. 17\u201322. Australian Computer Society Inc. (2014)"},{"issue":"10","key":"20_CR10","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1002\/sec.512","volume":"5","author":"F Liu","year":"2012","unstructured":"Liu, F., Xie, T., Feng, Y., Feng, D.: On the security of PPPoE network. Secur. Commun. Netw. 5(10), 1159\u20131168 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"20_CR11","unstructured":"TC 57 Power Systems Management and Associated Information Exchange: Power systems management and associated information exchange, data and communication security. IEC standard 62351. Technical report, International Electrotechnical Commission (2007)"},{"key":"20_CR12","unstructured":"TC 57 Power Systems Management and Associated Information Exchange: Communication networks and systems for power utility automation - Part 7\u20132: basic information and communication structure - abstract communication service interface. IEC standard 61850-7-2. Technical report, International Electrotechnical Commission (2010)"},{"key":"20_CR13","unstructured":"TC 57 Power Systems Management and Associated Information Exchange: Communication networks and systems for power utility automation - Part 5: communication requirements for functions and device models. IEC standard 61850\u20135. Technical report, International Electrotechnical Commission (2013)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Mander, T., Nabhani, F., Wang, L., Cheung, R.: Data object based security for DNP3 over TCP\/IP for increased utility commercial aspects security. In: 2007 IEEE Power Engineering Society General Meeting, pp. 1\u20138, June 2007","DOI":"10.1109\/PES.2007.386243"},{"issue":"1","key":"20_CR15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","volume":"100","author":"Y Mo","year":"2012","unstructured":"Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195\u2013209 (2012)","journal-title":"Proc. IEEE"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Poll, E., Ruiter, J.D., Schubert, A.: Protocol state machines and session languages: specification, implementation, and security flaws. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 125\u2013133, May 2015","DOI":"10.1109\/SPW.2015.32"},{"issue":"4","key":"20_CR17","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TPWRD.2010.2043122","volume":"25","author":"U Premaratne","year":"2010","unstructured":"Premaratne, U., Samarabandu, J., Sidhu, T., Beresh, R., Tan, J.C.: Security analysis and auditing of IEC61850-based automated substations. IEEE Trans. Power Deliv. 25(4), 2346\u20132355 (2010)","journal-title":"IEEE Trans. Power Deliv."},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Rashid, M.T.A., Yussof, S., Yusoff, Y., Ismail, R.: A review of security attacks on IEC61850 substation automation system network. In: 2014 International Conference on Information Technology and Multimedia (ICIMU), pp. 5\u201310, November 2014","DOI":"10.1109\/ICIMU.2014.7066594"},{"key":"20_CR19","unstructured":"Kaspersky Lab\u2019s Global Research and Analysis Team: Shamoon the wiper copycats at work. https:\/\/securelist.com\/blog\/incidents\/57854\/shamoon-the-wiper-copycats-at-work\/"},{"issue":"3","key":"20_CR20","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/JSYST.2012.2222000","volume":"7","author":"L Sassaman","year":"2013","unstructured":"Sassaman, L., Patterson, M.L., Bratus, S., Locasto, M.E.: Security applications of formal language theory. IEEE Syst. J. 7(3), 489\u2013500 (2013)","journal-title":"IEEE Syst. J."},{"key":"20_CR21","unstructured":"Shamir, U.: Analyzing a new variant of BlackEnergy 3 likely insider-based execution. Technical report, SentinelOne (2016)"},{"key":"20_CR22","volume-title":"Introduction to the Theory of Computation","author":"M Sipser","year":"1996","unstructured":"Sipser, M.: Introduction to the Theory of Computation, 1st edn. International Thomson Publishing, Boston (1996)","edition":"1"},{"key":"20_CR23","unstructured":"Cisco Systems: IP multicast technology overview. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios\/solutions_docs\/ip_multicast\/White_papers\/mcst_ovr.html"},{"issue":"5","key":"20_CR24","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Survey cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013)","journal-title":"Comput. Netw."},{"issue":"4","key":"20_CR25","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TSG.2011.2159999","volume":"2","author":"D Wei","year":"2011","unstructured":"Wei, D., Lu, Y., Jafari, M., Skare, P.M., Rohde, K.: Protecting smart grid automation systems against cyberattacks. IEEE Trans. Smart Grid 2(4), 782\u2013795 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Wood, D.K.N., Harang, D.R.E.: Grammatical inference and language frameworks for LANGSEC. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 88\u201398, May 2015","DOI":"10.1109\/SPW.2015.17"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Y., Littler, T., Sezer, S., McLaughlin, K., Wang, H.F.: Impact of cyber-security issues on smart grid. In: 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (ISGT Europe), pp. 1\u20137, December 2011","DOI":"10.1109\/ISGTEurope.2011.6162722"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T07:50:45Z","timestamp":1570348245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}