Scalable Security Enforcement for Cyber Physical Systems

被引:0
作者
Baird, Alex [1 ]
Panda, Abhinandan [2 ]
Pearce, Hammond [3 ]
Pinisetty, Srinivas [2 ]
Roop, Partha [1 ]
机构
[1] Univ Auckland, Dept Elect Comp & Software Engn, Auckland 1010, New Zealand
[2] Indian Inst Technol IIT Bhubaneswar, Sch Elect Sci, Bhubaneswar 752050, India
[3] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
关键词
Security; runtime enforcement; synchronous programming; cyber-physical systems; HARDWARE SECURITY; CYBERSECURITY; VERIFICATION;
D O I
10.1109/ACCESS.2024.3357714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of Cyber-Physical Systems (CPSs) is increasingly important as more and more of these systems are added to the Internet of Things (IoT). As we increase the complexity and connectivity of our smart systems, we likewise broaden their digital attack surface. Recorded attacks on CPSs have caused significant physical impacts making methods for mitigation of attacks of paramount importance. The use of runtime enforcement (RE) can prevent violation of security policies. Here, runtime enforcers intervene before the CPS is compromised. Two key challenges are presented: (1) for complex systems, methods for automatically composing multiple policies are lacking; and (2) runtime enforcers are themselves executed digitally-meaning they too could have potential security vulnerabilities. We present the first comprehensive runtime enforcement framework which addresses both challenges. It can compose a lot of security policies in parallel and synthesize these policies into the more trustworthy hardware layers of a system. This removes reliance on potentially vulnerable firmware and software layers. We demonstrate our approach with policies to mitigate a set of attacks on a Fused Filament Fabrication (FFF) 3D printer. The experimental results show linear growth in logic element and register usage as the number of policies increase. This compares favourably to the exponential state space explosion that occurs with the conventional approach of monolithic composition. Additionally, we find higher enforcer clock frequencies are possible with the proposed parallel approach compared to existing serial approaches.
引用
收藏
页码:14385 / 14410
页数:26
相关论文
共 49 条
[1]  
[Anonymous], 2013, To Kill a Centrifuge: A Technical Analysis of What Stuxnets Creators Tried to Achieve
[2]  
Barcena M.B., 2015, Proc. Secur. Response, Symantec, P1
[3]   Firmato:: A novel firewall management toolkit [J].
Bartal, Y ;
Mayer, A ;
Nissim, K ;
Wool, A .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :17-31
[4]   Runtime Verification for LTL and TLTL [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (04)
[5]   Comparing LTL Semantics for Runtime Verification [J].
Bauer, Andreas ;
Leucker, Martin ;
Schallhart, Christian .
JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (03) :651-674
[6]   Composing Expressive Runtime Security Policies [J].
Bauer, Lujo ;
Ligatti, Jay ;
Walker, David .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2009, 18 (03)
[7]   The synchronous languages 12 years later [J].
Benveniste, A ;
Caspi, P ;
Edwards, SA ;
Halbwachs, N ;
Le Guernic, P ;
De Simone, R .
PROCEEDINGS OF THE IEEE, 2003, 91 (01) :64-83
[8]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[9]  
Bloem R., 2015, Lecture Notes in Computer Scienc), V9035
[10]  
CNN, 2021, Colonial Pipeline Ceo Admits to Authorizing 4.4 Million Ransomware Payment