Publications

Reports
Blog
News

Filter

19 October 2020

Practical example of fuzzing OPC UA applications

We continue to describe our approaches to searching for vulnerabilities in industrial systems based on the OPC UA protocol. In this article, we examine new techniques that can be used to search for memory corruption vulnerabilities if the source code is available. We also discuss an example of fuzzing using libfuzzer.

10 May 2018

OPC UA security analysis

This paper discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. In publishing this material, we hope to draw the attention of vendors that develop software for industrial automation systems and the industrial internet of things to problems associated with using such widely available technologies, which turned out to be quite common.

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 20
Products and services 12
Technologies 22
Types of threats 12

Select an author

Select a date

Filter

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Select a tag

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 20
Products and services 12
Technologies 22
Types of threats 12

Select an author

Select a date

Filter

Select a tag

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Filter