Active Fuzzing for Testing and Securing Cyber-Physical Systems

被引:15
作者
Chen, Yuqi [1 ]
Xuan, Bohan [2 ]
Poskitt, Christopher M. [1 ]
Sun, Jun [1 ]
Zhang, Fan [2 ,3 ,4 ]
机构
[1] Singapore Management Univ, Singapore, Singapore
[2] Zhejiang Univ, Hangzhou, Peoples R China
[3] Zhejiang Lab, Hangzhou, Peoples R China
[4] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou, Peoples R China
来源
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020 | 2020年
基金
新加坡国家研究基金会;
关键词
Cyber-physical systems; fuzzing; active learning; benchmark generation; testing defence mechanisms;
D O I
10.1145/3395363.3397376
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them. Assessing the effectiveness of these countermeasures is challenging, however, as realistic benchmarks of attacks are difficult to manually construct, blindly testing is ineffective due to the enormous search spaces and resource requirements, and intelligent fuzzing approaches require impractical amounts of data and network access. In this work, we propose active fuzzing, an automatic approach for finding test suites of packet-level CPS network attacks, targeting scenarios in which attackers can observe sensors and manipulate packets, but have no existing knowledge about the payload encodings. Our approach learns regression models for predicting sensor values that will result from sampled network packets, and uses these predictions to guide a search for payload manipulations (i.e. bit flips) most likely to drive the CPS into an unsafe state. Key to our solution is the use of online active learning, which iteratively updates the models by sampling payloads that are estimated to maximally improve them. We evaluate the efficacy of active fuzzing by implementing it for a water purification plant testbed, finding it can automatically discover a test suite of flow, pressure, and over/underflow attacks, all with substantially less time, data, and network access than the most comparable approach. Finally, we demonstrate that our prediction models can also be utilised as countermeasures themselves, implementing them as anomaly detectors and early warning systems.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 86 条
[51]   Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning [J].
Inoue, Jun ;
Yamagata, Yoriyuki ;
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :1058-1065
[52]  
ISA, 2020, ISA99, Industrial Automation and Control Systems Security
[53]   Real-Time Reachability for Verified Simplex Design [J].
Johnson, Taylor T. ;
Bak, Stanley ;
Caccamo, Marco ;
Sha, Lui .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2016, 15 (02)
[54]  
Kang E, 2016, 2016 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SESCPS), P22, DOI [10.1145/2897035.2897041, 10.1109/SEsCPS.2016.012]
[55]   Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks [J].
Kneib, Marcel ;
Huth, Christopher .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :787-800
[56]   Towards Concolic Testing for Hybrid Systems [J].
Kong, Pingfan ;
Li, Yi ;
Chen, Xiaohong ;
Sun, Jun ;
Sun, Meng ;
Wang, Jingyi .
FM 2016: FORMAL METHODS, 2016, 9995 :460-478
[57]   Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks [J].
Kravchik, Moshe ;
Shabtai, Asaf .
CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY, 2018, :72-83
[58]   A Formal Approach to Cyber-Physical Attacks [J].
Lanotte, Ruggero ;
Merro, Massimo ;
Muradore, Riccardo ;
Vigano, Luca .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :436-450
[59]  
Leyden John, 2016, The Register, V2016
[60]   TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems [J].
Lin, Qin ;
Adepu, Sridhar ;
Verwer, Sicco ;
Mathur, Aditya .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :525-536