skip to main content
10.1145/2732198.2732199acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Using Heterogeneous Computing to Implement a Trust Isolated Architecture for Cyber-Physical Control Systems

Published:14 April 2015Publication History

ABSTRACT

Cyber-physical control systems are networked through traditional IT infrastructures and prone to malware that can dangerously disrupt physical processes. We propose a trustworthy autonomic interface guardian architecture (TAIGA) that physically isolates trusted defense mechanisms from the untrusted production controller while acting as an intermediary for all controller I/O. Trusted modules adhere to stringent trust requirements that prevent malicious intrusion. In contrast to existing security measures, TAIGA observes the physical process instead of the cyber components by directly monitoring both supervisory and plant behavior. Harnessing heterogeneous computing on a Xilinx Zynq-7000 configurable SoC, TAIGA is applied to ensure stability of a rotary inverted pendulum by preemptively detecting malicious plant behavior and switching to a trusted high-assurance backup controller. Simulated attacks on the system show an increased resilience to reconfiguration and network integrity attacks, thereby strengthening the overall security of the system.

References

  1. Zynq-7000 All Programmable SoC, Technical Reference Manual, 1.7 edition, February 2014.Google ScholarGoogle Scholar
  2. E. Bernabeu, J. Thorp, and V. Centeno. Methodology for a security/dependability adaptive protection scheme based on data mining. Power Delivery, IEEE Transactions on, 27(1):104--111, Jan 2012.Google ScholarGoogle Scholar
  3. A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 355--366, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. A. Cárdenas, S. Amin, and S. Sastry. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08, pages 6:1--6:6, Berkeley, CA, USA, 2008. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Z. Franklin, C. Patterson, L. Lerner, and R. Prado. Isolating trust in an industrial control system-on-chip architecture. In Resilient Control Systems (ISRCS), 2014 7th International Symposium on, pages 1--6, Aug 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. E. A. Lee. Computing foundations and practice for cyber-physical systems: A preliminary report. Technical Report UCB/EECS-2007-72, EECS Department, University of California, Berkeley, May 2007.Google ScholarGoogle Scholar
  7. L. Lerner. Trustworthy Embedded Computing for Cyber-Physical Control. PhD thesis, Virginia Tech, Bradley Department of Electrical and Computer Engineering, Blacksburg, VA, Jan 2015.Google ScholarGoogle Scholar
  8. L. Lerner, Z. Franklin, W. Baumann, and C. Patterson. Application-level autonomic hardware to predict and preempt software attacks on industrial control systems. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 136--147, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. W. Lerner, M. M. Farag, and C. D. Patterson. Run-time prediction and preemption of configuration attacks on embedded process controllers. In Proceedings of the First International Conference on Security of Internet of Things, SecurIT '12, pages 135--144, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. W. Lerner, Z. R. Franklin, W. T. Baumann, and C. D. Patterson. Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems. In Proceedings of the 2014 ACM/SIGDA International Symposium on Field-programmable Gate Arrays, FPGA '14, pages 209--212, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Mo and B. Sinopoli. Secure control against replay attacks. In Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, pages 911--918, Sept 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. H. Morris and W. Gao. Industrial control system cyber attacks. Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, page 22, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Roman, E. Bobasu, and D. Sendrescu. Modelling of the rotary inverted pendulum system. In Automation, Quality and Testing, Robotics, 2008. AQTR 2008. IEEE International Conference on, volume 2, pages 141--146, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Sha. Using simplicity to control complexity. Software, IEEE, 18(4):20--28, Jul 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS '12, pages 55--64, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Teixeira, I. Shames, H. Sandberg, and K. Johansson. Revealing stealthy attacks in control systems. In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pages 1806--1813, Oct 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. Trusted Computing Group, Incorporated. TPM Main Specification Level 2 Version 1.2, Revision 116 Part 1 Design Principles, Mar 2011.Google ScholarGoogle Scholar

Index Terms

  1. Using Heterogeneous Computing to Implement a Trust Isolated Architecture for Cyber-Physical Control Systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CPSS '15: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security
              April 2015
              116 pages
              ISBN:9781450334488
              DOI:10.1145/2732198

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 April 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              CPSS '15 Paper Acceptance Rate9of26submissions,35%Overall Acceptance Rate33of113submissions,29%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader