Masters Theses
Process control systems security analysis utilizing reverse engineering
Keywords and Phrases
Wonderware
Abstract
"This paper investigates the processes and tools necessary to reverse engineer proprietary file formats. As a proof of concept, common control software, known as Supervisory, Control, and Data Acquisition, or SCADA, will be investigated. This software, which controls and monitors nation-wide Critical Infrastructure, is among the most important software to protect. Unfortunately, as we will discover, control software is quite vulnerable to attack. Particular attention is paid to the security configuration and alarm mechanisms. In this paper, several new vulnerabilities are identified and explored in both the security configuration and alarm system of one particular system, known as Wonderware. Finally, methodologies utilizing digital forensics will be discussed in order to protect against the identified vulnerabilities"--Abstract, page iii.
Advisor(s)
Miller, Ann K.
Committee Member(s)
Tauritz, Daniel R.
Erickson, Kelvin T.
Department(s)
Computer Science
Degree Name
M.S. in Computer Science
Publisher
University of Missouri--Rolla
Publication Date
Spring 2006
Pagination
ix, 84 pages
Rights
© 2006 Jason Russell Trent, All rights reserved.
Document Type
Thesis - Citation
File Type
text
Language
English
Subject Headings
Electronic data processing -- Security measuresProcess control -- Computer programsReverse engineering
Thesis Number
T 8956
Print OCLC #
82371952
Recommended Citation
Trent, Jason R., "Process control systems security analysis utilizing reverse engineering" (2006). Masters Theses. 5935.
https://scholarsmine.mst.edu/masters_theses/5935
Share My Thesis If you are the author of this work and would like to grant permission to make it openly accessible to all, please click the button above.