Reverse Engineering

Critical Infrastructure: You Get What You Pay For

Abstract:

Programmable Logic Controllers (PLCs) have proliferated into multiple commercial sectors,  including  critical  infrastructure  applications.  PLCs  often  manage  resources  that  offer high-impact targets but with a lackadaisical treatment of security—a recipe for trouble. This paper proposes a misuser-driven approach for PLC assessment. 

Top-Level Goals in Reverse Engineering Executable Software

ABSTRACT

People perform reverse engineering to discover vulnerabilities, to understand how attackers could exploit vulnerabilities, and to determine ways in which vulnerabilities might be mitigated. People reverse engineer executable programs to determine the structure, function, and behavior of software from unknown provenance that may not be trustworthy or safe to use.

Building Future Generations of Elite Cyber Professionals (CNODP)

ABSTRACT

With the increase in cyber attacks, defending America’s networks is one of the primary Department of Defense challenges in the 21st century. It is a national imperative to have elite cyber-warfare forces trained and ready to protect the country’s National Security Systems and critical infrastructure against attacks in cyberspace. To that end, the National Security Agency has created the Computer Network Operations Development Program (CNODP), a highly effective cyber-defense workforce-training program. The CNODP is NSA’s premier vehicle for developing skilled civilian and military personnel into highly effective cyber warriors and capability creators who build on their degrees in computer science, electrical and computer engineering, mathematics, and information assurance. Rotational work assignments provide program participants with challenging technical experiences in multiple locations, missions, and disciplines, as well as continual and enduring networking and mentorship within the broader Computer Network Operations community.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com