Runtime Enforcement for Control System Security

被引:8
作者
Lanotte, Ruggero [1 ]
Merro, Massimo [2 ]
Munteanu, Andrei [2 ]
机构
[1] Univ Insubria, Como, Italy
[2] Univ Verona, Verona, Italy
来源
2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020) | 2020年
关键词
Runtime enforcement; process calculus; control system security; PLC malware;
D O I
10.1109/CSF49147.2020.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosion of Industry 4.0, industrial facilities and critical infrastructures are transforming into "smart" systems that dynamically adapt to external events. The result is an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, which are more and more exposed to cyber-physical attacks, i.e., security breaches in cyberspace that adversely affect the physical processes at the core of industrial control systems. We apply runtime enforcement techniques, based on an ad-hoc sub-class of Ligatti et al.'s edit automata, to enforce specification compliance in networks of potentially compromised controllers, formalised in Hennessy and Regan's Timed Process Language. We define a synthesis algorithm that, given an alphabet P of observable actions and an enforceable regular expression e capturing a timed property for controllers, returns a monitor that enforces the property e during the execution of any (potentially corrupted) controller with alphabet P and complying with the property e. Our monitors correct and suppress incorrect actions coming from corrupted controllers and emit actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical properties, such as transparency and soundness, the proposed enforcement ensures non-obvious properties, such as polynomial complexity of the synthesis, deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers.
引用
收藏
页码:246 / 261
页数:16
相关论文
共 50 条
  • [11] Runtime enforcement monitors: composition, synthesis, and enforcement abilities
    Falcone, Ylies
    Mounier, Laurent
    Fernandez, Jean-Claude
    Richier, Jean-Luc
    FORMAL METHODS IN SYSTEM DESIGN, 2011, 38 (03) : 223 - 262
  • [12] Runtime enforcement of timed properties revisited
    Pinisetty, Srinivas
    Falcone, Ylies
    Jeron, Thierry
    Marchand, Herve
    Rollet, Antoine
    Timo, Omer Nguena
    FORMAL METHODS IN SYSTEM DESIGN, 2014, 45 (03) : 381 - 422
  • [13] Decentralized runtime enforcement for robotic swarms
    Hu, Chi
    Dong, Wei
    Yang, Yong-hui
    Shi, Hao
    Deng, Fei
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2020, 21 (11) : 1591 - 1606
  • [14] Runtime enforcement of timed properties revisited
    Srinivas Pinisetty
    Yliès Falcone
    Thierry Jéron
    Hervé Marchand
    Antoine Rollet
    Omer Nguena Timo
    Formal Methods in System Design, 2014, 45 : 381 - 422
  • [15] Bounded-Memory Runtime Enforcement
    Shankar, Saumya
    Rollet, Antoine
    Pinisetty, Srinivas
    Falcone, Ylies
    MODEL CHECKING SOFTWARE, SPIN 2022, 2022, 13255 : 114 - 133
  • [16] Runtime Enforcement using Buchi Games
    Renard, Matthieu
    Rollet, Antoine
    Falcone, Ylies
    SPIN'17: PROCEEDINGS OF THE 24TH ACM SIGSOFT INTERNATIONAL SPIN SYMPOSIUM ON MODEL CHECKING OF SOFTWARE, 2017, : 70 - 79
  • [17] Decentralized runtime enforcement for robotic swarms
    Chi Hu
    Wei Dong
    Yong-hui Yang
    Hao Shi
    Fei Deng
    Frontiers of Information Technology & Electronic Engineering, 2020, 21 : 1591 - 1606
  • [18] Runtime enforcement of timed properties using games
    Renard, Matthieu
    Rollet, Antoine
    Falcone, Ylies
    FORMAL ASPECTS OF COMPUTING, 2020, 32 (2-3) : 315 - 360
  • [19] Runtime Enforcement of Cyber-Physical Systems
    Pinisetty, Srinivas
    Roop, Partha S.
    Smyth, Steven
    Allen, Nathan
    Tripakis, Stavros
    Von Hanxleden, Reinhard
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [20] Modeling runtime enforcement with mandatory results automata
    Dolzhenko, Egor
    Ligatti, Jay
    Reddy, Srikar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 47 - 60