Obfuscation strategies for industrial control systems☆

被引:0
作者
Cozza, Vittoria [1 ]
Dalla Preda, Mila [1 ]
Lanotte, Ruggero [2 ]
Lucchese, Marco [1 ]
Merro, Massimo [1 ]
Zannone, Nicola [3 ]
机构
[1] Univ Verona, Str Grazie 15, I-37134 Verona, Italy
[2] Univ Insubria, Via Valleggio 11, I-22100 Como, Italy
[3] Eindhoven Univ Technol, POB 513, NL-5600 MB Eindhoven, Netherlands
关键词
Code obfuscation; Process comprehension; Programmable logic controller;
D O I
10.1016/j.ijcip.2024.100717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently released scan data on Shodan reveals that thousands of Industrial Control Systems (ICSs) worldwide are directly accessible via the Internet and, thus, exposed to cyber-attacks aiming at financial gain, espionage, or disruption and/or sabotage. Executing sophisticated cyber-physical attacks aiming to manipulate industrial functionalities requires a deep understanding of the underlying physical process at the core of the target ICS, for instance, through unauthorized access to memory registers of Programmable Logic Controllers (PLCs). However, to date, countermeasures aiming at hindering the comprehension of physical processes remain largely unexplored. In this work, we investigate the use of obfuscation strategies to complicate process comprehension of ICSs while preserving their runtime evolution. To this end, we propose a framework to design and evaluate obfuscation strategies for PLCs, involving PLC memory registers, PLC code (user program), and the introduction of extra (spurious) physical processes. Our framework categorizes obfuscation strategies based on two dimensions: the type of (spurious) registers employed in the obfuscation strategy and the dependence on the (genuine) physical process. To evaluate the efficacy of proposed obfuscation strategies, we introduce evaluation metrics to assess their potency and resilience, in terms of system invariants the attacker can derive, and their cost in terms of computational overhead due to runtime modifications of spurious PLC registers. We developed a prototype tool to automatize the devised obfuscation strategies and applied them to a non-trivial use case in the field of water tank systems. Our results show that code obfuscation can be effectively used to counter malicious process comprehension of ICSs achieved via scanning of PLC memory registers. To our knowledge, this is the first work using obfuscation as a technique to protect ICSs from such threats. The efficacy of the proposed obfuscation strategies predominantly depends on the intrinsic complexity of the interplay introduced between genuine and spurious registers.
引用
收藏
页数:16
相关论文
共 46 条
[11]  
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[12]  
Cozza V., 2023, SecIndustry@ARES
[13]   Semantics-based code obfuscation by abstract interpretation [J].
Dalla Preda, Mila ;
Giacobazzi, Roberto .
JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) :855-908
[14]  
De Sutter B, 2024, Arxiv, DOI arXiv:2307.07300
[15]   The Daikon system for dynamic detection of likely invariants [J].
Ernst, Michael D. ;
Perkins, Jeff H. ;
Guo, Philip J. ;
McCarnant, Stephen ;
Pacheco, Carlos ;
Tschantz, Matthew S. ;
Xiao, Chen .
SCIENCE OF COMPUTER PROGRAMMING, 2007, 69 (1-3) :35-45
[16]  
Falliere N., 2011, Symantec Secur. Response
[17]  
Feng Cheng, 2019, NDSS
[18]   On Ladder Logic Bombs in Industrial Control Systems [J].
Govil, Naman ;
Agrawal, Anand ;
Tippenhauer, Nils Ole .
COMPUTER SECURITY, 2017, 2018, 10683 :110-126
[19]  
Green B., 2017, Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, P57, DOI 10.1145/3140241.3140254
[20]   PCaaD: Towards automated determination and exploitation of industrial systems [J].
Green, Benjamin ;
Derbyshire, Richard ;
Krotofil, Marina ;
Knowles, William ;
Prince, Daniel ;
Suri, Neeraj .
COMPUTERS & SECURITY, 2021, 110