Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
German steel mill cyber attack, Industrial Control Systems, vol.30, 2014. ,
Analysis of the cyber attack on the ukrainian power grid, SANS Industrial Control Systems, 2016. ,
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol, Computer Safety, Reliability, and Security -35th International Conference Proceedings, pp.67-75, 2016. ,
DOI : 10.1007/978-3-540-68899-0
URL : https://hal.archives-ouvertes.fr/hal-01366059
Formally Verifying Flow Integrity Properties in Industrial Systems, SECRYPT 2017 -14th International Conference on Security and Cryptography, p.12, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01527913
The use of attack trees in assessing vulnerabilities in scada systems, Proceedings of the international infrastructure survivability workshop, 2004. ,
A review of cyber security risk assessment methods for SCADA systems, Computers & Security, vol.56, pp.1-27, 2015. ,
DOI : 10.1016/j.cose.2015.09.009
Cross-fertilization between safety and security engineering, Reliability Engineering & System Safety, vol.110, pp.110-126, 2013. ,
DOI : 10.1016/j.ress.2012.09.011
A survey of approaches combining safety and security for industrial control systems, Reliability Engineering & System Safety, vol.139, pp.156-178, 2015. ,
DOI : 10.1016/j.ress.2015.02.008
URL : https://hal.archives-ouvertes.fr/hal-01222958
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-8, 2012. ,
DOI : 10.1109/CRISIS.2012.6378942
URL : https://hal.archives-ouvertes.fr/hal-01222960
Security Modeling with BDMP: From Theory to Implementation, 2011 Conference on Network and Information Systems Security, pp.1-8, 2011. ,
DOI : 10.1109/SAR-SSI.2011.5931382
A Model Based Approach For SCADA Safety And Security Joint Modelling: S-Cube, 10th IET System Safety and Cyber-Security Conference 2015, 2015. ,
DOI : 10.1049/cp.2015.0293
Towards Formal Security Analysis of Industrial Control Systems, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.114-126, 2017. ,
DOI : 10.1038/474142a
The CL-Atse Protocol Analyser, 17th International Conference on Term Rewriting and Applications -RTA, pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions, International Conference on Formal Engineering Methods, pp.175-192, 2016. ,
DOI : 10.1038/474142a
A Tutorial on Uppaal, pp.200-236, 2004. ,
DOI : 10.1007/978-3-540-30080-9_7
Génération systématique de scénarios d'attaques contre des systèmes industriels, Approches Formelles dans l'Assistance au Développement de Logiciels, 2016. ,
Design and synthesis of synchronization skeletons using branching time temporal logic. Logics of programs, pp.52-71, 1982. ,
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1981. ,
The dolev-yao intruder is the most powerful attacker, 16th Annual Symposium on Logic in Computer Science?LICS, 2001. ,