Skip to Main Content
Handbook of SCADA/Control Systems Security
book

Handbook of SCADA/Control Systems Security

by Robert Radvanovsky, Jacob Brodsky
April 2016
Intermediate to advanced content levelIntermediate to advanced
383 pages
13h 29m
English
CRC Press
Content preview from Handbook of SCADA/Control Systems Security
62 Handbook of SCADA/Control Systems Security
reliant upon specic memory offsets of an application given a specic patch level.
Once an application is patched, the memory allocation of the vulnerable point may
change, rendering the exploit inoperative. This is not the same as the payload that
is delivered and installed following a successful exploit. The exploit is designed
to enable access, while the payload is designed to retain access. What the analyst
would expect to see will differ depending on what class of malware it is. Getting
back to the human in the loop, the malware coders are not waking up every day
designing new innovative ways to exploit the x86 architecture. Once an operational
payload is designed, they will continue to repur ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
Techno Security's Guide to Securing SCADA

Techno Security's Guide to Securing SCADA

Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, James H. Windle

Publisher Resources

ISBN: 9781466502260