Scanning the Cycle: Timing-based Authentication on PLCs

被引:6
作者
Ahmed, Chuadhry Mujeeb [1 ]
Ochoa, Martin [2 ]
Zhou, Jianying [3 ]
Mathur, Aditya [3 ]
机构
[1] Univ Strathclyde, Glasgow, Lanark, Scotland
[2] AppGate, Medellin, Colombia
[3] Singapore Univ Technol & Design, Singapore, Singapore
来源
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
新加坡国家研究基金会;
关键词
Programmable Logic Controllers; PLC Security; Scan Cycle; Authentication; Timing Channel; ICS Security; SCADA Security; ANOMALY DETECTION; CLOCK SKEW; IDENTIFICATION; SYSTEMS;
D O I
10.1145/3433210.3453102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmable Logic Controllers (PLCs) are a core component of an Industrial Control System (ICS). However, if a PLC is compromised or the commands sent across a network from the PLCs are spoofed, consequences could be catastrophic. In this work, a novel technique to authenticate PLCs is proposed that aims at raising the bar against powerful attackers while being compatible with real-time systems. The proposed technique captures timing information for each controller in a non-invasive manner. It is argued that Scan Cycle is a unique feature of a PLC that can be approximated passively by observing network traffic. An attacker that spoofs commands issued by the PLCs would deviate from such fingerprints. To detect replay attacks a PLC Watermarking technique is proposed. PLC Watermarking models the relation between the scan cycle and the control logic by modeling the input/output as a function of request/response messages of a PLC. The proposed technique is validated on an operational water treatment plant (SWaT) and smart grid (EPIC) testbeds. Results from experiments indicate that PLCs can be distinguished based on their scan cycle timing characteristics.
引用
收藏
页码:886 / 900
页数:15
相关论文
共 48 条
  • [1] Ahmed Chuadhry Mujeeb, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P219, DOI 10.1145/3395351.3399364
  • [2] NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
    Ahmed, Chuadhry Mujeeb
    Mathur, Aditya P.
    Ochoa, Martin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (01)
  • [3] Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
    Ahmed, Chuadhry Mujeeb
    Zhou, Jianying
    [J]. IEEE SECURITY & PRIVACY, 2020, 18 (06) : 14 - 22
  • [4] NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
    Ahmed, Chuadhry Mujeeb
    Ochoa, Martin
    Zhou, Jianying
    Mathur, Aditya P.
    Qadeer, Rizwan
    Murguia, Carlos
    Ruths, Justin
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 483 - 497
  • [5] Ahmed Chuadhry Mujeeb, 2020, 2020 CPS4CIP WORKSHO
  • [6] [Anonymous], 2014, EUROSEC AMSTERDAM NE
  • [7] Astrom K.J., 1984, Computer-Controlled Systems. Theory and Design
  • [8] Bradley Allen, 2018, LOGIX 5000 CONTROLLE
  • [9] Cardenas A, 2009, P WORKSH FUT DIR CYB
  • [10] Caselli Marco, 2013, LECT NOTES COMPUT SC