A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers

被引:7
作者
Alsabbagh, Wael [1 ,2 ]
Langendoerfer, Peter [1 ,2 ]
机构
[1] IHP Leibniz Inst Innovat Mikroelekt, Technol Pk 25, D-15236 Frankfurt, Germany
[2] Brandenburg Univ Technol Cottbus Senftenberg, MINT Fac, Comp Sci Dept, D-03046 Cottbus, Germany
来源
AUTOMATION | 2022年 / 3卷 / 04期
关键词
industrial control system; programmable logic controller; control logic injection attack; program injection; program modification; PLCS;
D O I
10.3390/automation3040030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable logic controllers (PLCs) make up a substantial part of critical infrastructures (CIs) and industrial control systems (ICSs). They are programmed with a control logic that defines how to drive and operate critical processes such as nuclear power plants, petrochemical factories, water treatment systems, and other facilities. Unfortunately, these devices are not fully secure and are prone to malicious threats, especially those exploiting vulnerabilities in the control logic of PLCs. Such threats are known as control logic injection attacks. They mainly aim at sabotaging physical processes controlled by exposed PLCs, causing catastrophic damage to target systems as shown by Stuxnet. Looking back over the last decade, many research endeavors exploring and discussing these threats have been published. In this article, we present a flashback on the recent works related to control logic injection attacks against PLCs. To this end, we provide the security research community with a new systematization based on the attacker techniques under three main attack scenarios. For each study presented in this work, we overview the attack strategies, tools, security goals, infected devices, and underlying vulnerabilities. Based on our analysis, we highlight the current security challenges in protecting PLCs from such severe attacks and suggest security recommendations for future research directions.
引用
收藏
页码:596 / 621
页数:26
相关论文
共 64 条
[1]  
Abbasi A., 2016, P BLACK HAT EUR LOND, P1
[2]  
Alsabbagh W., 2022, 2022 28 INT C INF CO, P1, DOI [10.1109/ICAT54566.2022.9811147, DOI 10.1109/ICAT54566.2022.9811147]
[3]   A Fully-Blind False Data Injection on PROFINET I/O Systems [J].
Alsabbagh, Wael ;
Langendoerfer, Peter .
PROCEEDINGS OF 2021 IEEE 30TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2021,
[4]   A New Injection Threat on S7-1500 PLCs-Disrupting the Physical Process Offline [J].
Alsabbagh, Wael ;
Langendoeerfer, Peter .
IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY, 2022, 3 :146-162
[5]   A Control Injection Attack against S7 PLCs - Manipulating the Decompiled Code [J].
Alsabbagh, Wael ;
Langendoerfer, Peter .
IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
[6]   A Stealth Program Injection Attack against S7-300 PLCs [J].
Alsabbagh, Wael ;
Langendoerfer, Peter .
2021 22ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2021, :986-993
[7]   Patch Now and Attack Later - Exploiting S7 PLCs by Time-Of-Day Block [J].
Alsabbagh, Wael ;
Langendoerfer, Peter .
2021 4TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2021, :144-151
[8]  
Assante M.J., 2016, Confirmation of a Coordinated Attack on the Ukrainian Power Grid, P207
[9]   Empirical Study of PLC Authentication Protocols in Industrial Control Systems [J].
Ayub, Adeen ;
Yoo, Hyunguk ;
Ahmed, Irfan .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, :383-397
[10]  
Basnight Z., 2013, Master's Thesis