REFERENCES
ANSSI (2012). Managing cybersecurity for ICS.
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Com-
pagna, L., Cuellar, J., Drielsma, P. H., Heám, P.-C.,
Kouchnarenko, O., Mantovani, J., Mödersheim, S., von
Oheimb, D., R., M., Santiago, J., Turuani, M., Viganò,
L., and Vigneron, L. (2005). The AVISPA tool for the
automated validation of internet security protocols and
applications. In CAV’05.
Backes, M., Dreier, J., Kremer, S., and Künnemann, R.
(2017). A novel approach for reasoning about live-
ness in cryptographic protocols and its application to
fair exchange. In EuroS&P’17. To appear.
Basin, D., Mödersheim, S., and Viganò, L. (2003). An on-
the-fly model-checker for security protocol analysis.
In ESORICS’03.
Blanchet, B. (2001). An efficient cryptographic protocol
verifier based on Prolog rules. In CSFW’01.
Bratus, S., Crain, A. J., Hallberg, S. M., Hirsch, D. P., Patter-
son, M. L., Koo, M., and Smith, S. W. (2016). Imple-
menting a vertically hardened dnp3 control stack for
power applications. In ICSS’16, pages 45–53.
Clark, D. D. and Wilson, D. R. (1987). A comparison of
commercial and military computer security policies. In
Security and Privacy, 1987 IEEE Symposium on, pages
184–184. IEEE.
Clarke, G. R., Reynders, D., and Wright, E. (2004). Practical
modern SCADA protocols: DNP3, 60870.5 and related
systems. Newnes.
Cremers, C. (2008). The Scyther Tool: Verification, falsifi-
cation, and analysis of security protocols. In CAV’08.
Cremers, C., Horvat, M., Scott, S., and van der Merwe, T.
(2016). Automated analysis and verification of TLS
1.3: 0-rtt, resumption and delayed authentication. In
SP’16.
Dolev, D. and Yao, A. C. (1981). On the security of public
key protocols. Information Theory, IEEE Transactions
on, 29(2):198–208.
Dreier, J., Lafourcade, P., and Lakhnech, Y. (2013). Formal
verification of e-auction protocols. In POST’13.
Dutertre, B. (2007). Formal modeling and analysis of the
MODBUS protocol. In Critical Infrastructure Protec-
tion, pages 189–204. Springer.
Dzung, D., Naedele, M., von Hoff, T., and Crevatin, M.
(2005). Security for industrial communication systems.
Proceedings of the IEEE, 93(6):1152–1177.
Fovino, I., Carcano, A., Masera, M., and Trombetta, A.
(2009). Design and implementation of a secure MOD-
BUS protocol. In IFIP AICT’09.
Hayes, G. and El-Khatib, K. (2013). Securing MODBUS
transactions using hash-based message authentication
codes and stream transmission control protocol. In
ICCIT’13.
Heintze, N. and Riecke, J. G. (1998). The slam calculus:
programming with secrecy and integrity. In POPL’98.
IEC-62439 (2016). Industrial communication networks -
High availability automation networks - Part 3: Paral-
lel Redundancy Protocol (PRP) and High-availability
Seamless Redundancy (HSR). International Elec-
trotechnical Commission.
Kremer, S. and Ryan, M. D. (2005). Analysis of an electronic
voting protocol in the applied pi-calculus. In ESOP’05.
Lafourcade, P. and Puys, M. (2015). Performance evalu-
ations of cryptographic protocols. verification tools
dealing with algebraic properties. In FPS 2015.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. Security & Privacy, IEEE, 9(3):49–51.
Lowe, G. (1997). A hierarchy of authentication specifica-
tions. In CSFW ’97.
Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013).
The TAMARIN prover for the symbolic analysis of
security protocols. In CAV’13.
MODBUS (2004). MODBUS IDA, MODBUS messaging
on TCP/IP implementation guide v1.0a.
OPC Unified Architecture (2012). Part 6: Mappings.
Patel, S. C. and Yu, Y. (2007). Analysis of SCADA security
models. International Management Review, 3(2):68.
Patterson, M. and Hirsch, D. (2014). Hammer parser genera-
tor. https://github.com/UpstandingHackers/hammer.
Puys, M., Potet, M., and Lafourcade, P. (2016). Formal
analysis of security properties on the OPC-UA SCADA
protocol. In SAFECOMP’16.
Saul, E. and Hutchison, A. (1999). SPEAR II – the security
protocol engineering and analysis resource.
Schmidt, B., Meier, S., Cremers, C., and Basin, D. (2012).
Automated analysis of diffie-hellman protocols and
advanced security properties. In CSF’12.
Stouffer, K., Falco, J., and Karen, S. (2011). Guide to
industrial control systems (ICS) security. NIST special
publication, 800(82):16–16.
Umezawa, Y. and Shimizu, T. (2005). A formal verification
methodology for checking data integrity. In DATE’05.
Wanying, Q., Weimin, W., Surong, Z., and Yan, Z. (2015).
The study of security issues for the industrial control
systems communication protocols. JIMET’15.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
66