Главная
Study mode:
on
1
Intro
2
What is Runtime
3
Componentbased architecture
4
Component manager
5
System components
6
Unpacking
7
Proprietary protocol
8
Protocol stack
9
Processing
10
Additional fields
11
Tree topology
12
Final service level
13
Runtime vulnerability
14
Redirect traffic
15
UDP broadcast response
16
What can we do
17
Code analysis
18
Conclusion
Description:
Explore a comprehensive security analysis of the CODESYS framework for PLC control in this 30-minute conference talk by Alexander Nochvay, Security Researcher at Kaspersky. Delve into Runtime weaknesses, PDU Protocol model disadvantages, and other critical issues affecting industrial cybersecurity. Gain insights into component-based architecture, proprietary protocols, and potential vulnerabilities in the CODESYS ecosystem. Learn about code analysis techniques and potential mitigation strategies for enhancing PLC control security. Access accompanying slides for in-depth visual references and expand your knowledge on industrial cybersecurity through additional resources provided by Kaspersky.

The Fall of CODESYS - Researching Security of the Framework for PLC Control

Kaspersky
Add to list