Runtime Enforcement for Control System Security

被引:8
|
作者
Lanotte, Ruggero [1 ]
Merro, Massimo [2 ]
Munteanu, Andrei [2 ]
机构
[1] Univ Insubria, Como, Italy
[2] Univ Verona, Verona, Italy
来源
2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020) | 2020年
关键词
Runtime enforcement; process calculus; control system security; PLC malware;
D O I
10.1109/CSF49147.2020.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosion of Industry 4.0, industrial facilities and critical infrastructures are transforming into "smart" systems that dynamically adapt to external events. The result is an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, which are more and more exposed to cyber-physical attacks, i.e., security breaches in cyberspace that adversely affect the physical processes at the core of industrial control systems. We apply runtime enforcement techniques, based on an ad-hoc sub-class of Ligatti et al.'s edit automata, to enforce specification compliance in networks of potentially compromised controllers, formalised in Hennessy and Regan's Timed Process Language. We define a synthesis algorithm that, given an alphabet P of observable actions and an enforceable regular expression e capturing a timed property for controllers, returns a monitor that enforces the property e during the execution of any (potentially corrupted) controller with alphabet P and complying with the property e. Our monitors correct and suppress incorrect actions coming from corrupted controllers and emit actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical properties, such as transparency and soundness, the proposed enforcement ensures non-obvious properties, such as polynomial complexity of the synthesis, deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers.
引用
收藏
页码:246 / 261
页数:16
相关论文
共 50 条
  • [1] Industrial Control Systems Security via Runtime Enforcement
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (01)
  • [2] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [3] Runtime Enforcement of Security Policies on Black Box Reactive Programs
    Ngo, Minh
    Massacci, Fabio
    Milushev, Dimiter
    Piessens, Frank
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 43 - 54
  • [4] Predictive runtime enforcement
    Pinisetty, Srinivas
    Preoteasa, Viorel
    Tripakis, Stavros
    Jeron, Thierry
    Falcone, Ylies
    Marchand, Herve
    FORMAL METHODS IN SYSTEM DESIGN, 2017, 51 (01) : 154 - 199
  • [5] Predictive runtime enforcement
    Srinivas Pinisetty
    Viorel Preoteasa
    Stavros Tripakis
    Thierry Jéron
    Yliès Falcone
    Hervé Marchand
    Formal Methods in System Design, 2017, 51 : 154 - 199
  • [6] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [7] Compositional runtime enforcement revisited
    Srinivas Pinisetty
    Ankit Pradhan
    Partha Roop
    Stavros Tripakis
    Formal Methods in System Design, 2021, 59 : 205 - 252
  • [8] Compositional runtime enforcement revisited
    Pinisetty, Srinivas
    Pradhan, Ankit
    Roop, Partha
    Tripakis, Stavros
    FORMAL METHODS IN SYSTEM DESIGN, 2021, 59 (1-3) : 205 - 252
  • [9] Runtime enforcement monitors: composition, synthesis, and enforcement abilities
    Yliès Falcone
    Laurent Mounier
    Jean-Claude Fernandez
    Jean-Luc Richier
    Formal Methods in System Design, 2011, 38 : 223 - 262
  • [10] Adaptive Industrial Control Systems via IEC 61499 and Runtime Enforcement
    Faqrizal, Irman
    Salaün, Gwen
    Falcone, Yliès
    ACM Transactions on Autonomous and Adaptive Systems, 2024, 19 (04)