Securing javascript runtime of OPC UA deployments
dc.contributor.author | Schindler,Josef | |
dc.contributor.author | Belaidi,Siwar | |
dc.contributor.author | Kirdan,Erkin | |
dc.contributor.author | Waedt,Karl | |
dc.contributor.editor | Demmler, Daniel | |
dc.contributor.editor | Krupka, Daniel | |
dc.contributor.editor | Federrath, Hannes | |
dc.date.accessioned | 2022-09-28T17:10:06Z | |
dc.date.available | 2022-09-28T17:10:06Z | |
dc.date.issued | 2022 | |
dc.description.abstract | OPC UA is a commonly used machine-to-machine communication protocol. As it is used in industrial critical infrastructure, its security is vital. OPC UA has several proprietary and open-source implementations in different programming languages. Among them, a JavaScript implementation node-opcua stands out due to advantages such as ease of use, code maturity etc. JavaScript is a just-in-time compiled programming language that is executed by a runtime system. Node.js is the most common runtime environment to run JavaScript programs. Deno is it a potential and unofficial successor as it is developed by the original author of Node.js. One promised improvement of Deno is the focus on higher security, such as having a restricted file system and network access by default. Since (1) not all libraries have been adopted yet for for Deno, since (2) this new runtime comes with a compatibility mode featured first in version v1.15, since (3) there is very few research literature yet and since (4) there is no current dedicated OPC UA implementation for Deno so far, we present and evaluate measures to overcome errors when running node-opcua on Deno in this paper. | en |
dc.identifier.doi | 10.18420/inf2022_133 | |
dc.identifier.isbn | 978-3-88579-720-3 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/39488 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | INFORMATIK 2022 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-326 | |
dc.subject | opc ua | |
dc.subject | security | |
dc.subject | node.js | |
dc.subject | deno | |
dc.subject | javascript | |
dc.title | Securing javascript runtime of OPC UA deployments | en |
gi.citation.endPage | 1556 | |
gi.citation.startPage | 1551 | |
gi.conference.date | 26.-30. September 2022 | |
gi.conference.location | Hamburg | |
gi.conference.sessiontitle | 7th GI/ACM I4.0 Workshop on Industrial Automation and Control Systems |
Dateien
Originalbündel
1 - 1 von 1