Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System

被引:36
作者
Ma, Rongkuan [1 ]
Cheng, Peng [2 ]
Zhang, Zhenyong [2 ]
Liu, Wenwen [1 ]
Wang, Qingxian [1 ]
Wei, Qiang [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310000, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
0-day vulnerability; industrial cyber-physical system (iCPS); programmable logic controller; redundant controller architecture; stealthy attack; DATA-INJECTION ATTACK;
D O I
10.1109/JIOT.2019.2931349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an industrial cyber-physical system (iCPS), the controller plays a critical role in guaranteeing reliability and stability. Therefore, redundant controller architecture is a well-adopted approach by distributed control systems (DCS), supervisory control and data acquisition (SCADA), and other typical iCPSs. They monitor and control the critical industrial process, such as power generation, chemical industry, water treatment plant, etc. Redundant controller architecture has been designed and largely implemented in response to unpredictable mechanical failures. However, this structure initially proposed for guaranteeing reliability and safety may expand the cyber-attack surface, posing the risk that an attacker may take advantage of this architecture for stealthy attacks. In this article, we analyze the vulnerability arising from the redundant controller architecture and propose a combined attack methodology against these redundant controller architecture systems in a stealthy manner. We find several 0-day vulnerabilities of the real-world devices from three manufacturers and further implement the combined attack over these devices. Our experimental results over various types of real-world devices show that the redundant controller architecture can be exploited to compromise all tested systems stealthily. We also present guidelines for mitigating this risk.
引用
收藏
页码:9783 / 9793
页数:11
相关论文
共 37 条
[1]  
Abbasi A, 2016, INT C CRITICAL INFOR, P1
[2]   ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers [J].
Abbasi, Ali ;
Holz, Thorsten ;
Zambon, Emmanuele ;
Etalle, Sandro .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :437-448
[3]  
[Anonymous], 2015, DUQU 2 0 COMP DUQU
[4]  
[Anonymous], 2017, P NETW DISTR SYST SE
[5]  
[Anonymous], 80082 SP NIST
[6]  
[Anonymous], SECURITY ATTACKS IND
[7]  
[Anonymous], 2011, P HOTSEC
[8]  
[Anonymous], 2014, P 2014 NETW DISTR SY
[9]  
[Anonymous], 3S CODESYS VULNERABI
[10]  
[Anonymous], TIME BOMB 14 BYTES