The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems

被引:8
作者
Herzberg, Amir [1 ]
Kfir, Yehonatan [2 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
[2] Bar Ilan Univ, Ramat Gan, Israel
来源
CPS-SPC'19: PROCEEDINGS OF THE ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY | 2019年
关键词
cyber physical systems; covert channel; cyber security; intrusion detection; SOLENOID VALVE; RESPONSE-TIME;
D O I
10.1145/3338499.3357358
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Strict regulations and security practices of critical cyber-physical systems, such as nuclear plants, require complete isolation between their data-acquisition zone and their safety and security zones. Isolation methods range from firewall devices, to 'data diodes' that only allow one-way communication. In this work we explore a possible threat bypassing existing isolation methods by communicating through the physical process. Specifically, we show how a corrupt actuator in one zone can send covert information to a sensor in a different zone, breaking the isolation. This may allow an attack where the actuator is intentionally malfunctioning, and the sensor is intentionally masking the malfunction. Furthermore, we show that under certain assumptions, such communication can be provably covert. Namely, it cannot be efficiently detected, by current and future detection systems. This has important implications for the design of security and safety mechanisms for critical cyber-physical systems.
引用
收藏
页码:87 / 98
页数:12
相关论文
共 51 条
[1]   Analytic Calculus of Response Time in Networked Automation Systems [J].
Addad, Boussad ;
Amari, Said ;
Lesage, Jean-Jacques .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2010, 7 (04) :858-869
[2]   Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J].
Ahmed, Chuadhry Mujeeb ;
Zhou, Jianying ;
Mathur, Aditya P. .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :566-581
[3]   pH control using PI control algorithms with automatic tuning method [J].
Ali, E .
CHEMICAL ENGINEERING RESEARCH & DESIGN, 2001, 79 (A5) :611-620
[4]   Product and convolution theorems for the fractional Fourier transform [J].
Almeida, LB .
IEEE SIGNAL PROCESSING LETTERS, 1997, 4 (01) :15-17
[5]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[6]  
[Anonymous], 2014, ARXIV14061213
[7]  
[Anonymous], 2014, 30 ANN COMP SEC APPL, DOI [10.1145/2664243.2664277, DOI 10.1145/2664243.2664277]
[8]  
[Anonymous], 2010, CYB SEC PROGR NUCL F
[9]  
[Anonymous], ARXIV160605915
[10]  
[Anonymous], 2012, ELEMENTS INFORM THEO