Benjamin Green

Orcid: 0000-0002-1013-9933

Affiliations:
  • Lancaster University, Security Lancaster Institute, Lancaster, UK


According to our database1, Benjamin Green authored at least 32 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool.
Comput. Secur., April, 2023

Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology.
CoRR, 2023

Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines.
Proceedings of the IFIP Networking Conference, 2023

To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2022

Snakes and Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool.
CoRR, 2022

Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security.
Comput. Secur., 2022

2021
Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2021

PCaaD: Towards Automated Determination and Exploitation of Industrial Processes.
CoRR, 2021

PCaaD: Towards automated determination and exploitation of industrial systems.
Comput. Secur., 2021

"Talking a different Language": Anticipating adversary attack cost for cyber risk assessment.
Comput. Secur., 2021

2020
ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

A Framework to Support ICS Cyber Incident Response and Recovery.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

Extended Abstract - Transformers: Intrusion Detection Data in Disguise.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases.
CoRR, 2019

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure.
Proceedings of the Critical Information Infrastructures Security, 2019

Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs.
PhD thesis, 2018

Surveillance and security: protecting electricity utilities and other critical infrastructures.
Energy Inform., 2018

An Analysis of Cyber Security Attack Taxonomies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Panning for gold: Automatically analysing online social engineering attack surfaces.
Comput. Secur., 2017

Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

"How Long is a Piece of String": : Defining Key Phases andObserved Challenges within ICS Risk Assessment.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Threat awareness for critical infrastructures resilience.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Achieving ICS Resilience and Security through Granular Data Flow Management.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
The Impact of Social Engineering on Industrial Control System Security.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
Socio-Technical Security Analysis of Industrial Control Systems (ICS).
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

2007
Network interrupts: supporting delay sensitive applications in low power wireless control networks.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007


  Loading...