Threat modelling of industrial controllers: A firmware security perspective

被引:0
作者
Varghese, Anitha [1 ]
Bose, Arijit Kumar [1 ]
机构
[1] ABB Corp Res, Bangalore, Karnataka, India
来源
PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID) | 2014年
关键词
Embedded Controller; Firmware; Threats; Industrial; Anticounterfeiting; Confidentiality;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial devices are becoming more and more networked, as M2M communications gain acceptance. Industrial controllers are usually resource constrained real time devices, and the firmware of these controllers play a vital role enabling the controllers to function accurately and reliably. Binary image of the firmware in these embedded controllers are usually key intellectual property of any OEM making the device. Developing the firmware for a control function is a time consuming process, and being able to get the binary image of firmware can accelarate the product building for counterfieting. We provide a survey of the different threats, different attack methods to materialize the threats, attacker capability required to mount an attack based on an existing threat, and the impact of these attacks on the system. In this paper, we discuss the traditional industrial firmware management process like its distribution, updation and installation in industrial controllers, and describe the security threats in the firmware management methods. We also provide mitigation methods to the threats identified.
引用
收藏
页码:16 / 19
页数:4
相关论文
共 3 条
[1]  
Hernan S., 2018, Uncover Security Design Flaws using The STRIDE Approach
[2]  
Meier J.D., 2003, Improving Web Application Security: Threats and Countermeasures
[3]  
Schneier B, APPL CRYPTOGRAPHY PR, V20th