Availability Attacks on Computing Systems through Alteration of Environmental Control: Smart Malware Approach

被引:38
作者
Chung, Keywhan [1 ]
Kalbarczyk, Zbigniew T. [1 ]
Iyer, Ravishankar K. [1 ]
机构
[1] Univ Illinois, Urbana, IL 61820 USA
来源
ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS | 2019年
基金
美国国家科学基金会;
关键词
Cyber Security; Cyber Physical Systems; CPS; Malware;
D O I
10.1145/3302509.3311041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we demonstrate the feasibility of smart malware that advances state-of-the-art attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system (CPS) that manages the environment in which the computing enterprise operates, (ii) disguising its malicious actions as accidental failures, and (iii) self-learning attack strategies from cyber-physical system measurement data. We address all aspects of the malware, including the construction of the self-learning malware and the launch of a failure injection attack. We validate the attacks in a data-driven CPS simulation environment developed as part of this study.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 28 条
[1]  
Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
[2]  
[Anonymous], 2015, P 2015 S BOOTC SCI S
[3]   Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies [J].
Anwar, Zahid ;
Malik, Asad Waqar .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (07) :1175-1178
[4]  
Cardenas A. A., 2008, HOTSEC, V5, P15
[5]  
Chung K, 2016, IEEE CONF COMM NETW, P406, DOI 10.1109/CNS.2016.7860528
[6]   Lessons Learned From the Analysis of System Failures at Petascale: The Case of Blue Waters [J].
Di Martino, Catello ;
Kalbarczyk, Zbigniew ;
Iyer, Ravishankar K. ;
Baccanico, Fabio ;
Fullop, Joseph ;
Kramer, William .
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, :610-621
[7]   On Energy Security of Smartphones [J].
Gao, Xing ;
Liu, Dachuan ;
Liu, Daiping ;
Wang, Haining .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :148-150
[8]  
Gao Xing, 2018, P NETW DISTR SYST SE
[9]  
Garcia L., 2017, P ANN NETW DISTR SYS
[10]  
Hartigan J. A., 1979, Applied Statistics, V28, P100, DOI 10.2307/2346830