You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol.
Wael AlsabbaghPeter LangendörferPublished in: WFCS (2023)
Keyphrases
- authentication protocol
- key exchange protocol
- denial of service attacks
- lightweight
- attack scenarios
- malicious users
- cryptographic protocols
- coloured petri nets
- attack detection
- countermeasures
- ddos attacks
- smart card
- intrusion detection system
- dos attacks
- data protection
- ip address
- security protocols
- sensitive data