all InfoSec news
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs. (arXiv:2212.04229v1 [cs.CR])
Dec. 9, 2022, 2:10 a.m. | Prashant Hari Narayan Rajput (1), Constantine Doumanidis (2), Michail Maniatakos (2) ((1) NYU Tandon School of Engineering, (2) New York University Ab
cs.CR updates on arXiv.org arxiv.org
The paradigm shift of enabling extensive intercommunication between the
Operational Technology (OT) and Information Technology (IT) devices allows
vulnerabilities typical to the IT world to propagate to the OT side. Therefore,
the security layer offered in the past by air gapping is removed, making
security patching for OT devices a hard requirement. Conventional patching
involves a device reboot to load the patched code in the main memory, which
does not apply to OT devices controlling critical processes due to downtime, …
automated control data industrial industrial control systems localization non systems vulnerability
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC