=Paper= {{Paper |id=Vol-3008/short2 |storemode=property |title=Cybersecurity for Quantum Computing |pdfUrl=https://ceur-ws.org/Vol-3008/short2.pdf |volume=Vol-3008 |authors=Natalie Kilber,Daniel Kaestlen,Stefan Wagner |dblpUrl=https://dblp.org/rec/conf/qce/KilberK021 }} ==Cybersecurity for Quantum Computing== https://ceur-ws.org/Vol-3008/short2.pdf
Cybersecurity for Quantum Computing
Natalie Kilbera,b,c , Daniel Kaestled,e and Stefan Wagnerc
a
  MHP Management- und IT-Beratung GmbH, Königsallee 49, Ludwigsburg 71638, Germany
b
  Nablaco - A Natalie Kilber Advisory, Siemensstrasse 3, 71696 Moglingen, Germany
c
  Institute of Software Engineering - University of Stuttgart, Universitätsstrasse 38, 70569 Stuttgart, Germany
d
  Member of the Cyber Security Sharing and Analytics Association (CSSA)
e
  Certified Information Systems Security Professional (CISSP)


                                         Abstract
                                         With rising cyberattack frequency and range, Quantum Computing companies, institutions and research
                                         groups may become targets of nation state actors, cybercriminals and hacktivists for sabotage, espionage
                                         and fiscal motivations as the Quantum computing race intensifies. Quantum applications have expanded
                                         into commercial, classical information systems and services approaching the necessity to protect their
                                         networks, software, hardware and data from digital attacks. This paper discusses the status quo of
                                         quantum computing technologies and the quantum threat associated with it. We proceed to outline
                                         threat vectors for quantum computing systems and the respective defensive measures, mitigations
                                         and best practices to defend against the rapidly evolving threat landscape. We subsequently propose
                                         recommendations on how to proactively reduce the cyberattack surface through threat intelligence and
                                         by ensuring security by design of quantum software and hardware components.

                                         Keywords
                                         Quantum Computing, Quantum Software Engineering, Quantum Education and Training, Cybersecurity




1. Introduction
Cybersecurity is preparing for what is next, yet it is often an afterthought. With the
cybersecurity breaches on the rise[1], academia, companies, institutions and Quantum
Computing groups may become targets for cybercriminals Hacktivist and Advanced
Persistence Threats as the Quantum Computing race intensifies. Quantum applications
have expanded into classical information systems approaching the motivations and needs
of state of the art Software Engineering practices. Thus it is an imperative to build
in security during the design phase and therefore shift security left to ensure Quantum
Computing ecosystems, services, as well as promising technologies are reliable and secure to use.

  Continuous technological advancements towards a digital ecosystem encompass laboratory
environments, businesses, institutions, operational technologies and every connected device.

QSET’21 - 2nd Quantum Software Engineering and Technology Workshop co-located with IEEE International Conference
on Quantum Computing and Engineering (QCE21) (IEEE Quantum Week 2021) October 18–22, Virtual Conference
Envelope-Open natalie.kilber@nablaco.com (N. Kilber); stefan.wagner@uni-stuttgart.de (S. Wagner)
GLOBE https://www.nablaco.com/ (N. Kilber); https://www.iste.uni-stuttgart.de/institute/team/Wagner-00017/
(S. Wagner)
Orcid 0000-0001-6354-496X (N. Kilber); 0000-0002-6799-6709 (S. Wagner)
                                       © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Workshop
    Proceedings
                  http://ceur-ws.org
                  ISSN 1613-0073
                                       CEUR Workshop Proceedings (CEUR-WS.org)




                                                                                                          20
The recent shift to remote work and the growing digitalization is paralleled by the proliferation
of cyberattacks. Entities collecting and storing sensitive data such as intellectual property
regardless of sector or size are at a higher risk of being targeted for a cyberattack, be it espionage
or sabotage. Accruing attacks on supercomputers, academia, research and development sites as
of late [2, 3, 4] underline the premise. Various aspects of Quantum Computing Security have
been covered by many surveys and other papers [5, 6, 7, 8]. The main idea of this work covers
an overarching topic across every industry with digital capabilities to academic institutions and
groups, developing, designing or working with Quantum Computing Software or Hardware
including Quantum Technologies connected to a network. Startups, university spin-offs and
vendors benefit from a discussion early on if they introduce secure proprietary technologies for
users and secure their solutions from relevant threats. This survey’s intent also lies in spurring
discussions and furthering ideas in interdisciplinary research to reflect on educational paths for
Quantum Computing specialists.
Along with this focus, this paper will make a distinction between quantum computing systems
and quantum technologies with different technological m aturities. The latter range spans wide
and presents higher technological sophistication such as quantum - communication, - metrology
and - sensing, and the simulation and numerical techniques associated with it [9].


2. Preliminaries
Before getting to the threat vectors, we will review a few topics pertinent to understanding
the capabilities of quantum computers. Quantum Computing systems bring a number of
components together to form an optimized specialized processor for utilizing quantum
phenomena in their computation. Amdahl’s Law determines a co-processor linked to a
central processing unit capable of speeding up the overall execution, respectively of specific
computational intensive kernels, to be an accelerator [10]. To make a quantum computing
system Turing complete, a quantum processing unit (QPU), the co-processor, requires an analog
to digital interface to convert analog signals back and forth between the control system, which
in turn requires for the application logic a Host-CPU that may connect to a network [11].
Figure 1 captures an example of a general quantum accelerator architecture. For instance, a
Quantum as a Service, QaaS, offers managed compute capacity on demand over the cloud or
any other remote access.

  Underpinning these systems are the need for innovations in modern computing systems
due to the stagnation of trends of technological improvements in clock frequency, instruction
per Joule and clock cycle, core counts, transistor size and power density related to Moore’s,
Koomey’s and Denard’s scaling laws[12, 13, 10]. Advancements are progressing, however, there
are fundamental limits that these specialized circuits including QPUs have to abide, such as
the Landauer limit [14]. Given the low maturity of these systems, downtimes for calibration
and maintenance are imperative and elaborate. Existing bottlenecks in quantum computing
are often t ied t o u nresolved f undamental research q uestions s uch a s m issing s olutions for
physically realisable Quantum random access memory (QRAM) [15], as commercial QPUs
operate to date with read-only-memory (QROM). Another unsolved problem, rendering today’s




                                                 21
Figure 1: A Quantum Computing Architecture


devices under the Noisy-intermediate-scale Quantum (NISQ) era [16] is cross-talk error [17]
given limited error correction schemes and low fidelity - the reliability of the computation
given the noise of quantum gates. Open questions remain about the scaling to reduce the
size of the devices, especially wiring for the control reaching into cryogenic fridges i.e. for
superconducting quantum chips [18], although some types of photonic quantum chips can
operate in ambient temperatures, which again have a scaling problem due to bulky optical
components. Other bottlenecks include the necessity for exotic materials such as rare earth
metals for the fabrication of components and cryogenic environments having to be run on
Helium, which is a very limited resource to name a few unsolved supply chain constrictions.

   Further on, we will discuss the types of applications for which these quantum accelerators
are being designed in order to understand the value and motivation behind them. The flood of
news and articles about how Quantum Computing can break current security instances in the
future skews the picture of the status quo and misses to convey that these potential capabilities
are years away. Molecular simulation, catalyst or drug design and several optimization
problems are just a few applications a reliable quantum accelerator might conceivably push
scientific discoveries further [ 16]. Albeit, such systems have yet to be designed and so classical
counterparts dominate these optimizations and advancements for now. Take, for example,
the case of theoretical conjectures about RSA-2048 bit decryption with quantum accelerators.
Recent work by Google estimate 20 million NISQ device qubits to crack an RSA key within 8h
[19], whilst the newest developments in physical - not error corrected logical - qubits have
not officially surpassed the 100 qubit mark for NISQ devices [20], excluding digital annealer
technologies - special purpose analog machines for optimization. Other theoretical advances
promise the possibility of cracking RSA-2048 encryption with 13436 qubits in 177 Days [21]
and the premise of a multimode quantum memory, which also is a theoretical presumption that
has not been found. Even if we had a quadratic speedup due to a Grover algorithm for quantum
accelerated pre-sampling to brute force key search against AES, it wouldn’t be possible to break
anything above AES-256bit key length with supercomputers nowadays [22]. Here, researchers
argue that classified, encrypted data with longer intelligence life and shorter key length than




                                               22
AES-256, can be stored and broken in the future [23]. These may face a quantum threat from
the future, but intelligence with a shorter lifetime is not affected given that decryption might
take months. Hence, the reverse threat of quantum computing devices are not imminent and
the intelligence life of data plays a significant role in it.

   Yet, the issue of cybersecurity in nascent Quantum Computing resources is rarely discussed.
As Quantum Computing systems are and will be hybrid systems for the foreseeable future with
CPU-hosts, cloud-based or managed APIs, the need for reliable, secure services and architectures
arises. Subsequently, the critical applications and data these systems will handle and store,
demand a focus on appropriate security controls.


3. Threat Landscape
Behind every cyberattack stands a threat actor and a motivation associated with it. Threat
actors distinguish themselves through their objectives: politically motivated adversaries with
nation state vicinity are distinguished as nation-state actors, while financially motivated threat
actors classify under cybercrime, hacktivists are driven by ideology, but the boundaries are
blurry as some nation-state threat actors also have financial m otives. The growing global
importance of digitalisation and connectivity has also advanced the growth of the cybercrime
ecosystem with many criminal enterprises supporting threat actors with complimentary
data exfiltration, ransomware and malware-as-a-service o perations. The ecosystem evolved
to holistically cover cybercrime services: recruiting people, developing web-injection kits
or exploit networks, specialized distribution mechanisms like spam email delivery, offering
monetization schemes such as wire fraud and cryptocurrency services [1].

   The race to scientific advancements in quantum computing has been coined to be of national
security interest [6, 7]. Researchers suggest in overstated cryptographic claims that ”the nation
that wins the quantum race will be able to protect their secrets with a higher level of security
than contemporary cryptography guarantees and have unfettered access to those of the states
that lost it” [8]. Irrespective of the exaggerations, the scientific race towards funding quantum
computing and the subjacent hype is substantial for future applications of quantum computers
claiming to solve high-margin economic problems previously intractable by conventional
computational methods. Therefore the quantum race signifies an extension of state power
and a promised economic advantage of first-movers [ 23]. Accordingly, sabotage and research
espionage lie at the core of nation-state adversary objectives. As availability and economic
continuity of quantum services will mature the reliability, quality and responsibility of quantum
computing providers, this will inspire attacks to take these systems down. In the same way, it
will prompt cybercrime actors to seek financial gain in the sabotage, cyber extortion and data
theft of these s ystems. Hacktivists may disapprove of the use of limited resources, the type of
research being done or the mission statements of the targets seeking out similar tactics for their
ideological motivations.
On an abstract level, adversary tactics are similar. The first s tep i s r econnaissance t o get
to know the target, followed by establishing a foothold, escalating privileges and then




                                               23
proliferate throughout the network undetected. If the motive is espionage, the adversary
will try to remain undetected and cause little disturbance, whereas if an attacker’s motive is
sabotage, disruption and damage follow unveiling the presence of an adversary. Financial gain
objectives follow the same example coupled with either communication for extortion or data
being sold off in the b ackground. To defend against specific threat vectors and threat actor
strategies, their patterns of behaviour, bundled under the concept of Tactics, Techniques, and
Procedures (TTPs) need to be known. Even more so, the organization or institution being
targeted needs to know their own system and environment to effectively prevent possible attacks.

   Quantum computing systems either run in enterprise ecosystems constituting of one or a
mix of Windows, macOS, Linux, Azure AD, SaaS, IaaS, Network, Containers, etc. platforms;
or they are part of industrial control systems (ICS) often managed by a Supervisory Control
and Data Acquisition (SCADA) system, via programmable logic controllers (PLCs) or discrete
process control systems (DPC) [24]. Even in the case of ICS, the control systems are rarely,
air-gapped, that is, physically separated from any network.

   Targets for threat actors can be QaaS (Quantum-as-a-Serive), quantum application providers,
as well as users processing or consuming such services. Top vulnerabilities for cloud, web appli-
cations and ICS systems apply. Common cloud security risks encompass the misconfiguration
of services, infrastructure security, service or data integration and non-production environment
exposure [25]. While the prime web application security risks haven’t changed drastically over
the last decade and OAWSP Top Ten [26] represent an ample base for minimizing these risks.
Some of them are broken authentication methods or access control, sensitive data exposure or
cross-site scripting, where an attacker might take advantage of an API or manipulate the DOM
(Domain Object Model) to hijack user accounts, access browser histories, control browsers
remotely or spread malware. The most widespread types of vulnerabilities in ICS components
differ slightly due to the hardware a ffinity. Older control systems are a source of many severe
vulnerabilities and exploits against unpatched systems are widely available. OPC technology
(Open Platform Communications) inherit the vulnerabilities associated with respective RPC
(Remote Procedure Call) and DCOM services (Distributed Component Object Model), where a
full range of ports are open to communicate by default, especially for older control systems
like OPC classic. Buffer overflows, the use of hardcoded credentials and cross-site scripting
are amongst the top three automated ICS vulnerabilities [27, 28]. At last, arguably the most
important aspect is the human component. Social engineering and phishing attacks have high
rates of success exploiting human nature, i.e. associativity and curiosity. USB drop attacks,
impersonation and asking for internals can lead to spear phishing and credential theft. Not
just legacy systems, new software design and development too, has its drawbacks and dangers.
The use of hard-coded credentials, missing or improper authorization or authentication for
critical functions, incorrect default permissions and the exposure of sensitive information to
unauthorized actors are part of the most common and most dangerous software weaknesses.
The Top 25 Most Dangerous Software Weaknesses scored over the last two years can be found
on the CWE Top 25 List (Common Weakness Enumeration Top 25) [29]. A more detailed view
on TTPs of attackers for Enterprise Systems can be found on the MITRE ATT&CK framework
[30] or for the ICS systems on MITRE ATT&CKICS, which is a common framework used by the




                                               24
cybersecurity industry [31].


4. Defensive Measures, mitigations and best practices
The first step is knowing your own technology stack and e nvironment. Systems with a high
level of cybersecurity maturity exhibit security operation programs with extensive logging and
monitoring for threat detection and response activities. Dependent on the application, system
or processes, there is always a trade-off b etween cost and available r esources. Identifying
relevant risks to your critical assets and processes aids in putting vital security controls in place.

   Cyber hygiene and people awareness are your first line of defense you can easily strengthen.
Remote work policies need to be in place as your attack surface expands into the cloud
and homes’ of your employees. This means endpoints need to be protected, data at rest
and in transit should be encrypted. Depending on the risk appetite and critical assets and
applications, hybrid and cloud architectures need to be well configured regarding segmentation,
authorization, authentication and encryption for relevant perimeters with firewalls and DMZs
(Demilitarized Zone in perimeter networks) or follow a complete zero trust model if resources
allow it. Cloud security gap analyses and security reviews help in finding misconfigurations
and weaknesses. Non-production environments should not be neglected - especially research
and development systems. As for legacy software, for instance in ICS systems, OPC classic
should be migrated to OPC UA and further segmented to close the threat aperture with AAA
(Authentication, Authorization and Accounting) and instantiate firewalls, D MZs, w here it
is sensible. Quantum Computing Systems embrace a mix of off-the shelf components with
proprietary software and hardware, which implicates the responsibility for flashing by design
and releasing source-code bug fixes if for commercial u se. The responsibility in off-the shelf
components lies in recognizing vulnerabilities and patching them.

   Having a closer look on control systems, fail-safe systems should be segmented thereby
preventing single-points of failure. For instance, an attacker shouldn’t be able to have access
to the cooling system and control unit of the ADI/QPU through the same Host-CPU for a
sabotage attack on a compromised Quantum Computing System. The people vector is also
pivotal in ICS environments. An air-gapped system can only be breached by bridging that gap
to gain physical access. Unauthorized access by an insider threat or unaware employee can be
mitigated by tightly locking up physical access, only whitelisting approved USB sticks and/or
having a device antivirus scan stage implemented.

  A recommended set of actions for cyber defense in critical control systems can be found
on SANS CIS Controls [32] and for a comprehesive view on defense measures against sepcific
tactics, visit MITRE Shield [33]. OPC ICS Security Tools help design for more secure OPC
systems [34]. OWASP’s CLASP [35] and Microsoft’s S DL [ 36] help i n identifying security
vulnerabilities during every software design and development phase to have security built into
the product. The DevSecOps framework goes a step further in automating the integration of
security tools and processes in every phase of the software development lifecycle. Tools such as




                                                 25
Metasploit or W3AF allow developers to robustly test for any potential vulnerabilities [37].


5. Conclusion
Given the limited amount of resources and funding for quantum computing research and fewer
devices commercially available, we shouldn’t wait until something goes wrong. For that reason
alone, we should build and design quantum hardware and software components with security
in mind. Equally, the design of corresponding services should be shifted left. The Quantum
Computing industry is a likely target for sabotage, espionage and extortion motives. Threat
intelligence could change the otherwise reactive security activities to a more proactive fight
against threat actors and secure one’s system with foresight. MISP (Malware Information
Sharing Platform) is an open source threat intelligence platform [38] and a good place to start
understanding the types of threat actors.


6. Acknowledgements
We thank Pradeep Vingesh Raghupathy and Helmut G. Katzgraber for fruitful discussions. The
views and conclusions contained herein are those of the authors and should not be interpreted
as necessarily representing the official policies or endorsements, either expressed or implied, of
the CSSA.


References
 [1] CrowdStrike, 2021 global threat report: Adversary trends analysis, Accessed: 2021. URL:
     https://www.crowdstrike.com/resources/reports/global-threat-report/.
 [2] Bitdefender, Cyberattack against uk supercomputer archer forces operators to disable ac-
     cess for scientists, Accessed: 2021. URL: https://www.bitdefender.com/blog/hotforsecurity/
     cyberattack-against-uk-supercomputer-archer-forces-operators-to-disable-access-for-scientists.
 [3] J. News, Forschungszentrum jülich - jsc - archiv newsletter ”jsc news” - cyberattack against
     supercomputers, Accessed: 2021. URL: https://www.fz-juelich.de/SharedDocs/Meldungen/
     IAS/JSC/EN/2020/2020-06-cyberattack.html?nn=1060464.
 [4] NCSC, More ransomware attacks on uk education - ncsc.gov.uk, Accessed: 2021. URL: https:
     //www.ncsc.gov.uk/news/alert-targeted-ransomware-attacks-on-uk-education-sector.
 [5] N. Dunn, An introduction to quantum computing for security professionals author, 2021.
 [6] L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, D. Smith-Tone, Report on
     post-quantum cryptography, 2016. URL: https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.
     8105.pdf. doi:1 0 . 6 0 2 8 / N I S T . I R . 8 1 0 5 .
 [7] D. Moody, G. Alagic, D. C. Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.-K. Liu, C. A.
     Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone, J. Alperin-Sheriff, Status
     report on the second round of the nist post-quantum cryptography standardization process,
     2020. URL: https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf. doi:1 0 . 6 0 2 8 / N I S T .
     IR.8309.




                                               26
 [8] A. Majot, R. Yampolskiy, Global catastrophic risk and security implications of quantum
     computers, Futures 72 (2015) 17–26. doi:1 0 . 1 0 1 6 / J . F U T U R E S . 2 0 1 5 . 0 2 . 0 0 6 .
 [9] Q. Flagship, Competence framework for quantum technologies compiled by franziska
     greinert and rainer müller version 1.0 (may 2021), 2021. URL: https://op.europa.eu/en/
     publication-detail/-/publication/93ecfd3c-2005-11ec-bd8e-01aa75ed71a1/language-en.
[10] A. Reuther, P. Michaleas, M. Jones, V. Gadepally, S. Samsi, J. Kepner, Survey of machine
     learning accelerators (2020). URL: http://arxiv.org/abs/2009.00993http://dx.doi.org/10.1109/
     HPEC43674.2020.9286149. doi:1 0 . 1 1 0 9 / H P E C 4 3 6 7 4 . 2 0 2 0 . 9 2 8 6 1 4 9 .
[11] K. Bertels, A. Sarkar, A. Krol, R. Budhrani, J. Samadi, E. Geoffroy, J. Matos, R. Abreu,
     G. Gielen, I. Ashraf, Quantum accelerator stack: A research roadmap (2021). URL: http:
     //arxiv.org/abs/2102.02035.
[12] T. N. Theis, H. S. P. Wong, The end of moore’s law: A new beginning for information
     technology, Computing in Science and Engineering 19 (2017) 41–50. doi:1 0 . 1 1 0 9 / M C S E .
     2017.29.
[13] M. Horowitz, 1.1 computing’s energy problem (and what we can do about it), Digest
     of Technical Papers - IEEE International Solid-State Circuits Conference 57 (2014) 10–14.
     doi:1 0 . 1 1 0 9 / I S S C C . 2 0 1 4 . 6 7 5 7 3 2 3 .
[14] R. Landauer, Irreversibility and heat generation in the computing process, IBM Journal of
     Research and Development 5 (2010) 183–191. doi:1 0 . 1 1 4 7 / R D . 5 3 . 0 1 8 3 .
[15] O. D. Matteo, V. Gheorghiu, M. Mosca, Fault tolerant resource estimation of quantum
     random-access memories (2020).
[16] J. Preskill, Quantum computing in the nisq era and beyond, Quantum 2 (2018) 79.
     doi:1 0 . 2 2 3 3 1 / q - 2 0 1 8 - 0 8 - 0 6 - 7 9 .
[17] M. Sarovar, T. Proctor, K. Rudinger, K. Young, E. Nielsen, R. Blume-Kohout, Detecting
     crosstalk errors in quantum information processors, Quantum 4 (2020) 321. URL: https:
     //quantum-journal.org/papers/q-2020-09-11-321/. doi:1 0 . 2 2 3 3 1 / q - 2 0 2 0 - 0 9 - 1 1 - 3 2 1 .
[18] S. J. Pauka, K. Das, R. Kalra, A. Moini, Y. Yang, M. Trainer, A. Bousquet, C. Cantaloube,
     N. Dick, G. C. Gardner, M. J. Manfra, D. J. Reilly, A cryogenic cmos chip for generating
     control signals for multiple qubits, Nature Electronics 2021 4:1 4 (2021) 64–70. URL:
     https://www.nature.com/articles/s41928-020-00528-y. doi:1 0 . 1 0 3 8 / s 4 1 9 2 8 - 0 2 0 - 0 0 5 2 8 - y .
[19] C. Gidney, M. Ekerå, How to factor 2048 bit rsa integers in 8 hours using 20 mil-
     lion noisy qubits (2019). URL: http://arxiv.org/abs/1905.09749http://dx.doi.org/10.22331/
     q-2021-04-15-433. doi:1 0 . 2 2 3 3 1 / q - 2 0 2 1 - 0 4 - 1 5 - 4 3 3 .
[20] IBM, Ibm’s roadmap for scaling quantum technology | ibm research blog, Accessed: 2021.
     URL: https://research.ibm.com/blog/ibm-quantum-roadmap.
[21] Élie Gouzien, N. Sangouard, Factoring 2048-bit rsa integers in 177 days with 13 436 qubits
     and a multimode memory, Physical Review Letters 127 (2021). doi:1 0 . 1 1 0 3 / p h y s r e v l e t t .
     127.140503.
[22] L. K. Grover, A fast quantum mechanical algorithm for database search, Proceedings of
     the Annual ACM Symposium on Theory of Computing Part F129452 (1996) 212–219. URL:
     https://arxiv.org/abs/quant-ph/9605043v3.
[23] J. Tibbetts, Quantum computing and cryptography: Analysis, risks, and recommendations
     for decisionmakers, 2019.
[24] S. INstitute, Sans ics control systems are a target v1.3 09.30.21.pdf, Accessed: 2021. URL:




                                                       27
     https://sansorg.egnyte.com/dl/j2o3K3iiPy.
[25] Fortinet, Cloud security report (2021). URL: https://www.fortinet.com/content/dam/
     fortinet/assets/analyst-reports/ar-cybersecurity-cloud-security.pdf.
[26] OAWSP, Owasp top ten web application security risks | owasp, Accessed: 2021. URL:
     https://owasp.org/www-project-top-ten/.
[27] Kaspersky, Threat landscape for industrial automation systems. statistics for h2
     2020 | kaspersky ics cert, 2021. URL: https://ics-cert.kaspersky.com/reports/2021/03/25/
     threat-landscape-for-industrial-automation-systems-statistics-for-h2-2020/.
[28] Dragos, The ics threat landscape (2019). URL: https://www.dragos.com/wp-content/
     uploads/The-ICS-Threat-Landscape.pdf.
[29] CWE, Cwe - 2021 cwe top 25 most dangerous software weaknesses, Accessed: 2021. URL:
     https://cwe.mitre.org/top25/archive/2021/2021_cwe_top25.html.
[30] MITRE, Mitre attck® matrix for enterprise, Accessed: 2021. URL: https://attack.mitre.org/
     matrices/enterprise/.
[31] MITRE, Attck® for industrial control systems, Accessed: 2021. URL: https://collaborate.
     mitre.org/attackics/index.php/Main_Page.
[32] S. Institute, Cis controls v8 released | sans institute, Accessed: 2021. URL: https://www.
     sans.org/blog/cis-controls-v8/.
[33] MITRE, Active defense matrix, Accessed: 2021. URL: https://shield.mitre.org/matrix/.
[34] Github, Ics-security-tools/pcaps/opc at master · iti/ics-security-tools · github, Accessed:
     2021. URL: https://github.com/ITI/ICS-Security-Tools/tree/master/pcaps/OPC.
[35] CLASP, The clasp application security process the clasp application security process
     introduction 1 (2005).
[36] Microsoft, Microsoft security development lifecycle, Accessed: 2021. URL: https://www.
     microsoft.com/en-us/securityengineering/sdl/.
[37] S. Pratte, S. Fortozo, G. Kispal, A. Banvait, A. Azazi, N. Hiebert, Strategies for secure
     software development (2013).
[38] MISP, Misp galaxy clusters misp galaxy cluster (2021). URL: https://www.misp.software/
     galaxy.pdf.




                                              28