Security analysis of the ADS-B implementation in the next generation air transportation system

D McCallie, J Butts, R Mills - International Journal of Critical Infrastructure …, 2011 - Elsevier
The US Federal Aviation Administration’s Next Generation (NextGen) upgrade proposes a
fundamental transformation that is intended to increase the capacity and safety of the air …

A Taxonomy of Attacks on the DNP3 Protocol

S East, J Butts, M Papa, S Shenoi - International Conference on Critical …, 2009 - Springer
Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy
sector – more than 75% of North American electric utilities currently use DNP3 for industrial …

Firmware modification attacks on programmable logic controllers

Z Basnight, J Butts, J Lopez Jr, T Dube - International Journal of Critical …, 2013 - Elsevier
Recent attacks on industrial control systems, such as the highly publicized Stuxnet malware,
have intensified a “race to the bottom” where lower-level attacks have a tactical advantage. …

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices

R Bodenheim, J Butts, S Dunlap, B Mullins - International Journal of Critical …, 2014 - Elsevier
The Shodan computer search engine has received significant attention due to its ability to
identify and index Internet-facing industrial control system components. Industrial control …

An evaluation of modification attacks on programmable logic controllers

C Schuett, J Butts, S Dunlap - International Journal of Critical Infrastructure …, 2014 - Elsevier
Unprotected supervisory control and data acquisition (SCADA) systems offer promising targets
to potential attackers. Field devices, such as programmable logic controllers (PLCs), are …

Enhancing the security of aircraft surveillance in the next generation air traffic control system

C Finke, J Butts, R Mills, M Grimaila - International Journal of Critical …, 2013 - Elsevier
The US air traffic control system is reliant on legacy systems that artificially limit air traffic
capacity. With the demand for air transportation increasing each year, the US Federal Aviation …

[PDF][PDF] Security evaluation of the implantable cardiac device ecosystem architecture and implementation interdependencies

B Rios, J Butts - WhiteScope, sl, 2017 - a51.nl
Based on recent security concerns and events, WhiteScope performed an exhaustive security
evaluation on the implantable cardiac device ecosystem. This paper describes findings …

Evaluation of salivary cytokines for diagnosis of both trauma-induced and genetic heterotopic ossification

…, J Habbouche, D Cholok, J Butts… - Frontiers in …, 2017 - frontiersin.org
Purpose Heterotopic ossification (HO) occurs in the setting of persistent systemic inflammation.
The identification of reliable biomarkers can serve as an early diagnostic tool for HO, …

A firmware verification tool for programmable logic controllers

L McMinn, J Butts - International Conference on Critical Infrastructure …, 2012 - Springer
Current supervisory control and data acquisition (SCADA) systems do not have adequately
tailored security solutions. Programmable logic controllers (PLCs) in SCADA systems are …

Evaluation of security solutions in the SCADA environment

RD Larkin, J Lopez Jr, JW Butts… - ACM SIGMIS Database: the …, 2014 - dl.acm.org
Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric
power grid, water treatment facilities, oil and gas pipelines, railways, and other critical …