Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting - Critical Infrastructure Protection VIII Access content directly
Conference Papers Year : 2014

Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting

Abstract

Traditional cyber security mechanisms, such as network-based intrusion detection systems and signature-based antivirus software, have limited effectiveness in industrial control settings, rendering critical infrastructure assets vulnerable to cyber attacks. Even four years after the discovery of Stuxnet, security solutions that can directly monitor the execution of constrained platforms, such as programmable logic controllers, are not yet available. Power fingerprinting, which uses physical measurements from a side channel such as power consumption or electromagnetic emissions, is a promising new technique for detecting malicious software execution in critical systems. The technique can be used to directly monitor the execution of systems with constrained resources without the need to load third-party software artifacts on the platforms.This paper demonstrates the feasibility of using power fingerprinting to directly monitor programmable logic controllers and detect malicious software execution. Experiments with a Siemens S7 programmable logic controller show that power fingerprinting can successfully monitor programmable logic controller execution and detect malware similar to Stuxnet. Indeed, power fingerprinting has the potential to dramatically transform industrial control system security by providing a unified intrusion detection solution for critical systems.
Fichier principal
Vignette du fichier
978-3-662-45355-1_2_Chapter.pdf (1 Mo) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01386748 , version 1 (24-10-2016)

Licence

Attribution

Identifiers

Cite

Carlos Aguayo Gonzalez, Alan Hinton. Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting. 8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.15-27, ⟨10.1007/978-3-662-45355-1_2⟩. ⟨hal-01386748⟩
85 View
312 Download

Altmetric

Share

Gmail Facebook X LinkedIn More