ABSTRACT
Cyber-physical control systems are networked through traditional IT infrastructures and prone to malware that can dangerously disrupt physical processes. We propose a trustworthy autonomic interface guardian architecture (TAIGA) that physically isolates trusted defense mechanisms from the untrusted production controller while acting as an intermediary for all controller I/O. Trusted modules adhere to stringent trust requirements that prevent malicious intrusion. In contrast to existing security measures, TAIGA observes the physical process instead of the cyber components by directly monitoring both supervisory and plant behavior. Harnessing heterogeneous computing on a Xilinx Zynq-7000 configurable SoC, TAIGA is applied to ensure stability of a rotary inverted pendulum by preemptively detecting malicious plant behavior and switching to a trusted high-assurance backup controller. Simulated attacks on the system show an increased resilience to reconfiguration and network integrity attacks, thereby strengthening the overall security of the system.
- Zynq-7000 All Programmable SoC, Technical Reference Manual, 1.7 edition, February 2014.Google Scholar
- E. Bernabeu, J. Thorp, and V. Centeno. Methodology for a security/dependability adaptive protection scheme based on data mining. Power Delivery, IEEE Transactions on, 27(1):104--111, Jan 2012.Google Scholar
- A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 355--366, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- A. A. Cárdenas, S. Amin, and S. Sastry. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, pages 6:1--6:6, Berkeley, CA, USA, 2008. USENIX Association. Google ScholarDigital Library
- Z. Franklin, C. Patterson, L. Lerner, and R. Prado. Isolating trust in an industrial control system-on-chip architecture. In Resilient Control Systems (ISRCS), 2014 7th International Symposium on, pages 1--6, Aug 2014.Google ScholarCross Ref
- E. A. Lee. Computing foundations and practice for cyber-physical systems: A preliminary report. Technical Report UCB/EECS-2007-72, EECS Department, University of California, Berkeley, May 2007.Google Scholar
- L. Lerner. Trustworthy Embedded Computing for Cyber-Physical Control. PhD thesis, Virginia Tech, Bradley Department of Electrical and Computer Engineering, Blacksburg, VA, Jan 2015.Google Scholar
- L. Lerner, Z. Franklin, W. Baumann, and C. Patterson. Application-level autonomic hardware to predict and preempt software attacks on industrial control systems. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 136--147, June 2014. Google ScholarDigital Library
- L. W. Lerner, M. M. Farag, and C. D. Patterson. Run-time prediction and preemption of configuration attacks on embedded process controllers. In Proceedings of the First International Conference on Security of Internet of Things, SecurIT '12, pages 135--144, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- L. W. Lerner, Z. R. Franklin, W. T. Baumann, and C. D. Patterson. Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems. In Proceedings of the 2014 ACM/SIGDA International Symposium on Field-programmable Gate Arrays, FPGA '14, pages 209--212, New York, NY, USA, 2014. ACM. Google ScholarDigital Library
- Y. Mo and B. Sinopoli. Secure control against replay attacks. In Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, pages 911--918, Sept 2009. Google ScholarDigital Library
- T. H. Morris and W. Gao. Industrial control system cyber attacks. Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, page 22, 2013. Google ScholarDigital Library
- M. Roman, E. Bobasu, and D. Sendrescu. Modelling of the rotary inverted pendulum system. In Automation, Quality and Testing, Robotics, 2008. AQTR 2008. IEEE International Conference on, volume 2, pages 141--146, May 2008. Google ScholarDigital Library
- L. Sha. Using simplicity to control complexity. Software, IEEE, 18(4):20--28, Jul 2001. Google ScholarDigital Library
- A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS '12, pages 55--64, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- A. Teixeira, I. Shames, H. Sandberg, and K. Johansson. Revealing stealthy attacks in control systems. In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pages 1806--1813, Oct 2012.Google ScholarCross Ref
- Trusted Computing Group, Incorporated. TPM Main Specification Level 2 Version 1.2, Revision 116 Part 1 Design Principles, Mar 2011.Google Scholar
Index Terms
- Using Heterogeneous Computing to Implement a Trust Isolated Architecture for Cyber-Physical Control Systems
Recommendations
Cyber In-security of Industrial Control Systems: A Societal Challenge
SAFECOMP 2015: Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products and services. Many of the CI services as well as other organizations use Industrial Control Systems ICS to monitor and control ...
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach
PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and SecurityThe security of critical infrastructures such as oil and gas cyber-physical systems is a significant concern in today's world where malicious activities are frequent like never before. On one side we have cyber criminals who compromise cyber ...
Dependency-based security risk assessment for cyber-physical systems
AbstractA cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks against Cyber-Physical Systems (CPSs) are increasing at impressive rates. In times of Industry 4.0 and ...
Comments