[1]
R. Goodwins, Iran confirms Stuxnet attack on nuclear site , ZDNet UK, 26 September (2010).
Google Scholar
[2]
W. J. Broad, Stuxnet Worm Used Against Iran Was Tested in Israel , New York Times, 15 January (2011).
Google Scholar
[3]
N. Falliere, LO. Murchu, andE. Chien, W32. StuxnetDossier, http: /www. symantec. com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier. pdf, November (2010).
Google Scholar
[4]
C. Kruegel, W. Robertson, and G. Vigna, Detecting Kernel-level rootkits through binary analysis, Annual Computer Security ApplicationConference (ACSAC), (2004).
DOI: 10.1109/csac.2004.19
Google Scholar
[5]
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. Kemmerer, Behavior-based Spyware Detection, Usenix Security Symposium, (2006).
Google Scholar
[6]
J. Crandall, G. Wassermann, D. Oliveira, Z. Su, F. Wu, and F. Chong, Temporal Search: Detecting Hidden Malware Timebombs with VirtualMachines, Conference on Architectural Support for Programming Languages and OS, (2006).
DOI: 10.1145/1168857.1168862
Google Scholar
[7]
C. Willems, CWSandbox: Automatic Behaviour Analysis of Malware, http: /www. cwsandbox. org/, (2006).
Google Scholar
[8]
U. Bayer, C. Kruegel, and E. Kirda, TTAnalyze: A Tool for Analyzing Malware, 15th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), (2006).
Google Scholar
[9]
A. Vasudevan and R. Yerraballi, Cobra: Fine-grained Malware Analysis using Stealth Localized-Executions, IEEE Symposium on Security and Privacy, (2006).
DOI: 10.1109/sp.2006.9
Google Scholar
[10]
A. Moser, C. Kruegel, and E. Kirda, Exploring Multiple Execution Paths for Malware Analysis, IEEE Computer Society Press . USA, pp.231-245, (2007).
DOI: 10.1109/sp.2007.17
Google Scholar
[11]
W. Xiang-gen, S. Duan-feng, F. Deng-guo, and S. Pu-rui, Exploring Multiple Execution Paths for Malware Analysis Based on Coverage of Codes, Chinese Journal of Electronics, vol. Vol . 37 No. 4, 2009. 4.
Google Scholar
[12]
US-CERT Control System Security Program (CSSP), http: /www. us-cert. gov/control_ systems.
Google Scholar
[13]
L. Mora, OPC Server security considerations, Proceedings of SCADA Security Scientific Symposium, January (2007).
Google Scholar
[14]
M. Franz, ICCP Exposed: Assessing the Attack Surface of the Utility Stack, Proceedings of SCADA Security Scientific Symposium, January (2007).
Google Scholar
[15]
Object Linking and Embedding(OLE)for Process Control Specifications, http: /www. opcfoundation. org.
Google Scholar
[16]
C. Bellettini and J. L. Rrushi, Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness, Proceedings of the 2007 IEEE Workshop on Information Assurance, June (2007).
DOI: 10.1109/iaw.2007.381952
Google Scholar
[17]
IDART, http: /idart. sandia. gov.
Google Scholar
[18]
CS2SAT, http: /www. digitalbond. com/wiki/index. php/CS2SAT.
Google Scholar
[19]
R.A. Grimes, Malieious Mobile Code, Viurs Protection for Windows, vol. 1st ed, (2001).
Google Scholar