IPv4, IPv6, and Gigabit Ethernet are often mentioned together when discussing modern networks, but they
operate at different layers of the networking stack and serve dis…
The following 19 services & 5 features provided by the BACnet protocol offer significant
vulnerabilities to attack. This is how BACnet opens the door to various attacks.…
Cyber attacks against building automation systems can cause real-world
physical, operational, and safety impacts. These impacts range from
temporary s…
Executive Summary
Industry and Company
What We Are Trying To Solve: Attacks on Non-Critical system components
How Can Attacks Cause Harm - What are we Protecting?
Why BACnet IP? BACnet IP…
Building automation and industrial controls often live in small, fragmented product markets.
Compared to mainstream IT platforms, fewer deployments and fewer eyes on the…
Large-scale critical systems are often protected by multiple layers of redundancy, safety mechanisms,
and operational controls. However, history shows that failures or a…
Protocol Security Gateway Proposition – Overview
This section provides an organized entry point into Chipkin’s work on Protocol Security Gateways (PSGs)…
Vulnerabilities are UbiquitousThere are thousands of vendors with tens of thousands of products. Each of which can have design flaws and vulnerabilities.Many products use underlying resources (like L…
Protocol Security Gateway (PSG) - How it works
By device we mean the controller of a process or of a physical device such as a generator, sensor, lighting system, motors etc. Devices are monitored an…