🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

Open Platform Communications (OPC), the interoperability standard for the secure and reliable exchange of data in the industrial automation space, consists of two main types of protocol – classic and unified. The paper reviews a classic set of DA/HDA/A&E protocols, which is based on Microsoft DCOM and RPC technologies. Architectural cyber threats of the classic type of OPC are systematized in this work.

Sobre autores

D. Zegzhda

Peter the Great St.Petersburg Polytechnic University

Autor responsável pela correspondência
Email: dmitry@ibks.spbstu.ru
Rússia, St. Petersburg, 195251

M. Kalinin

Peter the Great St.Petersburg Polytechnic University

Autor responsável pela correspondência
Email: max@ibks.spbstu.ru
Rússia, St. Petersburg, 195251

M. Levykin

Federal Research Center “Computer Science and Control,” Russian Academy of Sciences

Email: max@ibks.spbstu.ru
Rússia, Moscow, 119333

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Allerton Press, Inc., 2019