MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about a comprehensive formal security analysis of the OPC UA industrial control system protocol in this 18-minute conference presentation from USENIX Security '25. Discover how researchers conducted an extensive security evaluation of both OPC UA versions 1.04 and 1.05, examining the transition from RSA-based to Diffie-Hellman-based cryptographic designs and the protocol's claims of Perfect Forward Secrecy. Explore the methodology used to analyze these complex industrial protocols through the ProVerif symbolic protocol verifier, including how the research team overcame significant verification challenges posed by one of the largest models ever studied in ProVerif. Understand the newly discovered vulnerabilities that were reported to and acknowledged by the OPC Foundation, and examine the provably secure fixes that have been incorporated into the upcoming standard version. Gain insights into the formal verification process for critical infrastructure protocols and the importance of comprehensive security analysis in industrial control systems deployed across critical infrastructures worldwide.
Syllabus
USENIX Security '25 - A Comprehensive Formal Security Analysis of OPC UA
Taught by
USENIX