A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, CAV'05, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

M. Backes, J. Dreier, S. Kremer, and R. Künnemann, A novel approach for reasoning about liveness in cryptographic protocols and its application to fair exchange, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01396282

D. Basin, S. Mödersheim, and L. Viganò, An onthe-fly model-checker for security protocol analysis, ESORICS'03, 2003.
DOI : 10.1007/978-3-540-39650-5_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Bratus, A. J. Crain, S. M. Hallberg, D. P. Hirsch, M. L. Patterson et al., Implementing a vertically hardened DNP3 control stack for power applications, Proceedings of the 2nd Annual Industrial Control System Security Workshop on , ICSS '16, pp.45-53, 2016.
DOI : 10.1145/3018981.3018985

D. D. Clark and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-184, 1987.
DOI : 10.1109/SP.1987.10001

G. R. Clarke, D. Reynders, W. , and E. , Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes, 2004.
DOI : 10.1016/b978-075065799-0/50019-x

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, 2008.
DOI : 10.1007/978-3-540-70545-1_38

C. Cremers, M. Horvat, S. Scott, and T. Van-der-merwe, Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.35

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981.

J. Dreier, P. Lafourcade, and Y. Lakhnech, Formal Verification of e-Auction Protocols, POST'13, 2013.
DOI : 10.1007/978-3-642-36830-1_13

URL : https://hal.archives-ouvertes.fr/hal-01338031

B. Dutertre, Formal Modeling and Analysis of the Modbus Protocol, Critical Infrastructure Protection, pp.189-204, 2007.
DOI : 10.1007/978-0-387-75462-8_14

D. Dzung, M. Naedele, T. Von-hoff, and M. Crevatin, Security for Industrial Communication Systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005.
DOI : 10.1109/JPROC.2005.849714

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

I. Fovino, A. Carcano, M. Masera, and A. Trombetta, Design and implementation of a secure MOD- BUS protocol, IFIP AICT'09, 2009.

G. Hayes and K. Khatib, Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), 2013.
DOI : 10.1109/ICCITechnology.2013.6579545

N. Heintze and J. G. Riecke, The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998.
DOI : 10.1145/268946.268976

S. Kremer and M. D. Ryan, Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, ESOP'05, 2005.
DOI : 10.1007/978-3-540-31987-0_14

P. Lafourcade and M. Puys, Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, 2015.
DOI : 10.1007/978-3-319-30303-1_9

URL : https://hal.archives-ouvertes.fr/hal-01306395

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.
DOI : 10.1109/CSFW.1997.596782

S. C. Patel and Y. Yu, Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007.

M. Patterson and D. Hirsch, Hammer parser generator . https://github, 2014.

M. Puys, M. Potet, and P. Lafourcade, Formal Analysis of Security Properties on the OPC-UA SCADA Protocol, SAFECOMP'16, 2016.
DOI : 10.1007/978-3-319-30303-1_9

URL : https://hal.archives-ouvertes.fr/hal-01366059

E. Saul and A. Hutchison, SPEAR II ? the security protocol engineering and analysis resource, 1999.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.25

K. Stouffer, J. Falco, K. , and S. , Guide to industrial control systems (ICS) security, NIST special publication, vol.800, issue.82, pp.16-16, 2011.
DOI : 10.6028/nist.sp.800-82r2

Y. Umezawa and T. Shimizu, A Formal Verification Methodology for Checking Data Integrity, Design, Automation and Test in Europe, 2005.
DOI : 10.1109/DATE.2005.15

URL : https://hal.archives-ouvertes.fr/hal-00181863

Q. Wanying, W. Weimin, Z. Surong, Y. , and Z. , The Study of Security Issues for the Industrial Control Systems Communication Protocols, Proceedings of the 2015 Joint International Mechanical, Electronic and Information Technology Conference, p.15, 2015.
DOI : 10.2991/jimet-15.2015.129