Obfuscation strategies for industrial control systems☆

被引:0
作者
Cozza, Vittoria [1 ]
Dalla Preda, Mila [1 ]
Lanotte, Ruggero [2 ]
Lucchese, Marco [1 ]
Merro, Massimo [1 ]
Zannone, Nicola [3 ]
机构
[1] Univ Verona, Str Grazie 15, I-37134 Verona, Italy
[2] Univ Insubria, Via Valleggio 11, I-22100 Como, Italy
[3] Eindhoven Univ Technol, POB 513, NL-5600 MB Eindhoven, Netherlands
关键词
Code obfuscation; Process comprehension; Programmable logic controller;
D O I
10.1016/j.ijcip.2024.100717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently released scan data on Shodan reveals that thousands of Industrial Control Systems (ICSs) worldwide are directly accessible via the Internet and, thus, exposed to cyber-attacks aiming at financial gain, espionage, or disruption and/or sabotage. Executing sophisticated cyber-physical attacks aiming to manipulate industrial functionalities requires a deep understanding of the underlying physical process at the core of the target ICS, for instance, through unauthorized access to memory registers of Programmable Logic Controllers (PLCs). However, to date, countermeasures aiming at hindering the comprehension of physical processes remain largely unexplored. In this work, we investigate the use of obfuscation strategies to complicate process comprehension of ICSs while preserving their runtime evolution. To this end, we propose a framework to design and evaluate obfuscation strategies for PLCs, involving PLC memory registers, PLC code (user program), and the introduction of extra (spurious) physical processes. Our framework categorizes obfuscation strategies based on two dimensions: the type of (spurious) registers employed in the obfuscation strategy and the dependence on the (genuine) physical process. To evaluate the efficacy of proposed obfuscation strategies, we introduce evaluation metrics to assess their potency and resilience, in terms of system invariants the attacker can derive, and their cost in terms of computational overhead due to runtime modifications of spurious PLC registers. We developed a prototype tool to automatize the devised obfuscation strategies and applied them to a non-trivial use case in the field of water tank systems. Our results show that code obfuscation can be effectively used to counter malicious process comprehension of ICSs achieved via scanning of PLC memory registers. To our knowledge, this is the first work using obfuscation as a technique to protect ICSs from such threats. The efficacy of the proposed obfuscation strategies predominantly depends on the intrinsic complexity of the interplay introduced between genuine and spurious registers.
引用
收藏
页数:16
相关论文
共 46 条
  • [1] Abbasi A, 2016, BLACK HAT EUROPE, V2016, P1
  • [2] OpenPLC: An IEC 61,131-3 compliant open source industrial controller for cyber security research
    Alves, Thiago
    Morris, Thomas
    [J]. COMPUTERS & SECURITY, 2018, 78 : 364 - 379
  • [3] [Anonymous], 2016, S7comm - The Wireshark Wiki
  • [4] Assante M. J., 2015, SANS Inst. InfoSec Read. Room, V1, P2
  • [5] Preventing Reverse Engineering of Control Programs in Industrial Control Systems
    Banerjee, Shalini
    Galbraith, Steven D.
    Khan, Tariq
    Castellanos, John Henry
    Russello, Giovanni
    [J]. PROCEEDINGS OF THE 9TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, CPSS 2023, 2023, : 48 - 59
  • [6] Brooks P, 2001, ETFA 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 2, PROCEEDINGS, P505, DOI 10.1109/ETFA.2001.997725
  • [7] Ceccato M., 2022, LNCS, V13785, P273
  • [8] Censys, 2023, Exposure Management and Threat Hunting Solutions
  • [9] Clarke G., 2004, Practical Modern SCADA Protocols: DNP3
  • [10] Clauset A, 2004, PHYS REV E, V70, DOI 10.1103/PhysRevE.70.066111