Protecting Infrastructure Assets from Real-Time and Run-Time Threats - Critical Infrastructure Protection VII Access content directly
Conference Papers Year : 2013

Protecting Infrastructure Assets from Real-Time and Run-Time Threats


Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the integrity of execution targets. A TC architecture can be combined with a real-time access control system to help protect against real-time availability and malware threats. However TC architectures offer only static (load-time) protection, so it is still necessary to address the possibility of run-time (execution) attacks. This paper focuses on the protection afforded by TC platforms to critical infrastructure assets. The paper defines a threat model, analyzes vulnerabilities, proposes services and tools that guarantee real-time availability with integrity, and demonstrates how they can be used to protect communications of an IEC61850-90-5-compliant substation automation system in an electricity grid. Also, it discusses the impact of run-time attacks on TC-compliant critical infrastructure assets.
Fichier principal
Vignette du fichier
978-3-642-45330-4_7_Chapter.pdf (962.36 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01456895 , version 1 (06-02-2017)





Jonathan Jenkins, Mike Burmester. Protecting Infrastructure Assets from Real-Time and Run-Time Threats. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.97-110, ⟨10.1007/978-3-642-45330-4_7⟩. ⟨hal-01456895⟩
46 View
80 Download



Gmail Facebook X LinkedIn More