The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, CAV'05, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
A novel approach for reasoning about liveness in cryptographic protocols and its application to fair exchange, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01396282
An onthe-fly model-checker for security protocol analysis, ESORICS'03, 2003. ,
DOI : 10.1007/978-3-540-39650-5_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.8115
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150
Implementing a vertically hardened DNP3 control stack for power applications, Proceedings of the 2nd Annual Industrial Control System Security Workshop on , ICSS '16, pp.45-53, 2016. ,
DOI : 10.1145/3018981.3018985
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-184, 1987. ,
DOI : 10.1109/SP.1987.10001
Practical modern SCADA protocols: DNP3, 60870.5 and related systems, Newnes, 2004. ,
DOI : 10.1016/b978-075065799-0/50019-x
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.35
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981. ,
Formal Verification of e-Auction Protocols, POST'13, 2013. ,
DOI : 10.1007/978-3-642-36830-1_13
URL : https://hal.archives-ouvertes.fr/hal-01338031
Formal Modeling and Analysis of the Modbus Protocol, Critical Infrastructure Protection, pp.189-204, 2007. ,
DOI : 10.1007/978-0-387-75462-8_14
Security for Industrial Communication Systems, Proceedings of the IEEE, vol.93, issue.6, pp.1152-1177, 2005. ,
DOI : 10.1109/JPROC.2005.849714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.5162
Design and implementation of a secure MOD- BUS protocol, IFIP AICT'09, 2009. ,
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), 2013. ,
DOI : 10.1109/ICCITechnology.2013.6579545
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, 1998. ,
DOI : 10.1145/268946.268976
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus, ESOP'05, 2005. ,
DOI : 10.1007/978-3-540-31987-0_14
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, 2015. ,
DOI : 10.1007/978-3-319-30303-1_9
URL : https://hal.archives-ouvertes.fr/hal-01306395
Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
DOI : 10.1109/CSFW.1997.596782
Analysis of SCADA security models, International Management Review, vol.3, issue.2, p.68, 2007. ,
Hammer parser generator . https://github, 2014. ,
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol, SAFECOMP'16, 2016. ,
DOI : 10.1007/978-3-319-30303-1_9
URL : https://hal.archives-ouvertes.fr/hal-01366059
SPEAR II ? the security protocol engineering and analysis resource, 1999. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.25
Guide to industrial control systems (ICS) security, NIST special publication, vol.800, issue.82, pp.16-16, 2011. ,
DOI : 10.6028/nist.sp.800-82r2
A Formal Verification Methodology for Checking Data Integrity, Design, Automation and Test in Europe, 2005. ,
DOI : 10.1109/DATE.2005.15
URL : https://hal.archives-ouvertes.fr/hal-00181863
The Study of Security Issues for the Industrial Control Systems Communication Protocols, Proceedings of the 2015 Joint International Mechanical, Electronic and Information Technology Conference, p.15, 2015. ,
DOI : 10.2991/jimet-15.2015.129