A Profinet IO Network of Class A uses standard Ethernet network components. If these network components can be attacked by e.g. a man-in-themiddle attack, this is also the case fo...
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...