skip to main content
10.1145/2459976.2460009acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Securing system controllers in critical infrastructures

Published: 08 January 2013 Publication History

Abstract

Control systems are at the heart of many critical infrastructures. Malicious attacks on system controllers like SCADA (Supervisory Control And Data Acquisition) systems are serious threats to critical national infrastructures such as smart grids, nuclear power plants, or transportation systems. Analyzing and verifying the security of the control systems has increasingly become an important defense mechanism. This paper presents an approach that facilitates a semi-automated security system verification of control systems by a novel application of model checking, a technique traditionally used for automated software verification. The proposed approach is different from typical model-checking applications in that it has the ability to uncover missing safety and security properties that should be specified to prevent catastrophes caused by malicious acts. We describe the approach by illustrating its use in analyzing a cooling reactor system controller in a nuclear power plant system. The approach is general and applicable to SCADA and other control systems.

References

[1]
Andress, J. and Winterfield, S., 2011. Cyber Warfare, Elsevier, Waltham, MA.
[2]
Amin, S., Cardenas, A. A., and Sastry, S. S., 2009. Safe and Secure Networked Control Systems under Denial-of-Service Attacks, in Hybrid Systems: Computation and Control. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, pp. 31--45.
[3]
Amin, S., Bayen, A. M., El Ghaoui, L., Sastry, S. S., 2007. Robust feasibility for control of water flow in a reservoir canal system. In Proceedings of the 46th IEEE Conference on Decision and Control, pp. 1571--1577.
[4]
Cardenas, A. A., Amin, S. and Sastry, S., 2008. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th Conference on Distributed Computing Systems ICDCS '08 (June 2008), pp. 495--500.
[5]
Cheung, S. C. and Kramer, J., 1999. Checking safety properties using compositional reachability analysis, ACM Trans. Software Engineering Methodology, 8(1): 49--78.
[6]
Falkenhainer, B. and Forbus, K., 1988. Setting up Large-scale Qualitative Models. In Proceedings of the 7th National Artificial Intelligence, Saint Paul, Minneapolis.
[7]
Heckman, M., Schell, R., and Reed, E., 2011. Using a high assurance TCB for infrastructure security. In Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligent Research (CSIIRW'11, October 12--14, Oak Ridge, Tennessee, USA). ACM, New York, DOI=http://10.1145/2179298.2179359.
[8]
Giannakopoulou, D., 1995. The Tracta approach for behaviour analysis of concurrent systems, Technical Report DoC 95/16, Imperial College, Department of Computing, 12.
[9]
Giannakopoulou, D., Pasareanu, C. S. and Barringer, H., 2002. Assumption generation for software component verification. In Proceedings of Automated Software Engineering, IEEE Computer Society, pp. 3--12.
[10]
Lampson, B., Abadi, M., Burrows, M. and Wobber, E., 1992. Authentication in distributed systems: theory and practices, ACM Trans. Comput. Syst., 10: 265--310.
[11]
Mills, E., 2010. Details of the first-ever control system malware. Cnet News. http://news.cnet.com/8301-27080_3-2011159-245.html.
[12]
Mo, Y. and Sinopoli, B., 2010. False data injection attacks in control systems. In First Workshop on Secure Control Systems, Stockholm, Sweden.
[13]
Velagapalli, A. and M. Ramkumar, 2011. Minimizing the TCB for Securing SCADA Systems. In Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligent Research (CSIIRW'11, October 12--14, Oak Ridge, Tennessee, USA). ACM, New York, DOI=http://dx.acm.org/10.1145/2179298.2179320.

Cited By

View all
  • (2015)Overview of cyber-security of industrial control system2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)10.1109/SSIC.2015.7245324(1-7)Online publication date: Aug-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. formal verification
  2. model-checking
  3. software assurance
  4. system security

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Overview of cyber-security of industrial control system2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)10.1109/SSIC.2015.7245324(1-7)Online publication date: Aug-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media