首页 > 最新文献

Proceedings of the 10th Annual Cyber and Information Security Research Conference最新文献

英文 中文
On the Design of Jamming-Aware Safety Applications in VANETs vanet中干扰感知安全应用的设计
Hani Alturkostani, Anup Chitrakar, R. Rinker, A. Krings
Connected vehicles communicate either with each other or with the fixed infrastructure using Dedicated Short Range Communication (DSRC). The communication is used by DSRC safety applications, such as forward collision warning, which are intended to reduce accidents. Since these safety applications operate in a critical infrastructure, reliability of the applications is essential. This research considers jamming as the source of a malicious act that could significantly affect reliability. Previous research has discussed jamming detection and prevention in the context of wireless networks in general, but little focus has been on Vehicular Ad Hoc Networks (VANET), which have unique characteristics. Other research discussed jamming detection in VANET, however it is not aligned with current DSRC standards. We propose a new jamming-aware algorithm for DSRC safety application design for VANET that increases reliability using jamming detection and consequent fail-safe behavior, without any alteration of existing protocols and standards. The impact of deceptive jamming on data rates and the impact of the jammer's data rate were studied using actual field measurements. Finally, we show the operation of the jamming-aware algorithm using field data.
联网车辆通过专用短程通信(DSRC)相互通信或与固定基础设施通信。该通信用于DSRC安全应用,如前向碰撞警告,旨在减少事故。由于这些安全应用程序在关键基础设施中运行,因此应用程序的可靠性至关重要。本研究认为干扰是一种会显著影响可靠性的恶意行为的来源。以往的研究主要讨论了无线网络环境下的干扰检测和预防,但很少关注具有独特特点的车载自组网(VANET)。其他研究讨论了VANET中的干扰检测,但它与当前的DSRC标准不一致。我们提出了一种新的干扰感知算法,用于VANET的DSRC安全应用设计,该算法通过干扰检测和随后的故障安全行为来提高可靠性,而无需改变现有协议和标准。通过实际现场测量,研究了欺骗性干扰对数据速率的影响以及干扰机数据速率的影响。最后,我们用现场数据展示了干扰感知算法的操作。
{"title":"On the Design of Jamming-Aware Safety Applications in VANETs","authors":"Hani Alturkostani, Anup Chitrakar, R. Rinker, A. Krings","doi":"10.1145/2746266.2746273","DOIUrl":"https://doi.org/10.1145/2746266.2746273","url":null,"abstract":"Connected vehicles communicate either with each other or with the fixed infrastructure using Dedicated Short Range Communication (DSRC). The communication is used by DSRC safety applications, such as forward collision warning, which are intended to reduce accidents. Since these safety applications operate in a critical infrastructure, reliability of the applications is essential. This research considers jamming as the source of a malicious act that could significantly affect reliability. Previous research has discussed jamming detection and prevention in the context of wireless networks in general, but little focus has been on Vehicular Ad Hoc Networks (VANET), which have unique characteristics. Other research discussed jamming detection in VANET, however it is not aligned with current DSRC standards. We propose a new jamming-aware algorithm for DSRC safety application design for VANET that increases reliability using jamming detection and consequent fail-safe behavior, without any alteration of existing protocols and standards. The impact of deceptive jamming on data rates and the impact of the jammer's data rate were studied using actual field measurements. Finally, we show the operation of the jamming-aware algorithm using field data.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122234951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Controlling Combinatorial Complexity in Software and Malware Behavior Computation 软件组合复杂度控制与恶意软件行为计算
M. Pleszkoch, R. Linger
Virtually all software is out of intellectual control in that no one knows its full behavior. Software Behavior Computation (SBC) is a new technology for understanding everything software does. SBC applies the mathematics of denotational semantics implemented by function composition in Functional Trace Tables (FTTs) to compute the behavior of programs, expressed as disjoint cases of conditional concurrent assignments. In some circumstances, combinatorial explosions in the number of cases can occur when calculating the behavior of sequences of multiple branching structures. This paper describes computational methods that avoid combinatorial explosions. The predicates that control branching structures such as ifthenelses can be organized into three categories: 1) Independent, resulting in no behavior case explosion, 2) Coordinated, resulting in two behavior cases, or 3) Goal-oriented, with potential exponential growth in the number of cases. Traditional FTT-based behavior computation can be augmented by two additional computational methods, namely, Single-Value Function Abstractions (SVFAs) and, introduced in this paper, Relational Trace Tables (RTTs). These methods can be applied to the three predicate categories to avoid combinatorial growth in behavior cases while maintaining mathematical correctness.
实际上,所有的软件都不受智力控制,因为没有人知道它的全部行为。软件行为计算(SBC)是一种用于理解软件行为的新技术。SBC应用由功能跟踪表(FTTs)中的函数组合实现的指示语义的数学来计算程序的行为,表示为条件并发赋值的不相交情况。在某些情况下,在计算多分支结构序列的行为时,可能会出现数目上的组合爆炸。本文描述了避免组合爆炸的计算方法。控制分支结构(如ifthenelses)的谓词可以分为三类:1)独立的,导致没有行为案例爆炸;2)协调的,导致两个行为案例;3)目标导向的,具有案例数量呈指数增长的潜力。传统的基于ftt的行为计算可以通过两种额外的计算方法来增强,即单值函数抽象(SVFAs)和本文介绍的关系跟踪表(rtt)。这些方法可以应用于三个谓词类别,以避免行为案例中的组合增长,同时保持数学正确性。
{"title":"Controlling Combinatorial Complexity in Software and Malware Behavior Computation","authors":"M. Pleszkoch, R. Linger","doi":"10.1145/2746266.2746281","DOIUrl":"https://doi.org/10.1145/2746266.2746281","url":null,"abstract":"Virtually all software is out of intellectual control in that no one knows its full behavior. Software Behavior Computation (SBC) is a new technology for understanding everything software does. SBC applies the mathematics of denotational semantics implemented by function composition in Functional Trace Tables (FTTs) to compute the behavior of programs, expressed as disjoint cases of conditional concurrent assignments. In some circumstances, combinatorial explosions in the number of cases can occur when calculating the behavior of sequences of multiple branching structures. This paper describes computational methods that avoid combinatorial explosions. The predicates that control branching structures such as ifthenelses can be organized into three categories: 1) Independent, resulting in no behavior case explosion, 2) Coordinated, resulting in two behavior cases, or 3) Goal-oriented, with potential exponential growth in the number of cases. Traditional FTT-based behavior computation can be augmented by two additional computational methods, namely, Single-Value Function Abstractions (SVFAs) and, introduced in this paper, Relational Trace Tables (RTTs). These methods can be applied to the three predicate categories to avoid combinatorial growth in behavior cases while maintaining mathematical correctness.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings of the 10th Annual Cyber and Information Security Research Conference 第十届网络与信息安全研究年会论文集
Joseph P. Trien, S. Prowell, R. A. Bridges, J. Goodall
This volume contains the papers presented at CISRC-10: Cyber and Information Security Research Conference held on April 6-8, 2015 at Oak Ridge National Laboratory in Oak Ridge, Tennessee.
本卷包含2015年4月6日至8日在田纳西州橡树岭国家实验室举行的CISRC-10:网络与信息安全研究会议上发表的论文。
{"title":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","authors":"Joseph P. Trien, S. Prowell, R. A. Bridges, J. Goodall","doi":"10.1145/2746266","DOIUrl":"https://doi.org/10.1145/2746266","url":null,"abstract":"This volume contains the papers presented at CISRC-10: Cyber and Information Security Research Conference held on April 6-8, 2015 at Oak Ridge National Laboratory in Oak Ridge, Tennessee.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133841034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automobile ECU Design to Avoid Data Tampering 避免数据篡改的汽车ECU设计
Lu Yu, Juan Deng, R. Brooks, S. Yun
Modern embedded vehicle systems are based on network architectures. Vulnerabilities from in-vehicle communications are significant. Privacy and security measures are required for vehicular Electronic Control Units (ECUs). We present a security vulnerability analysis, which shows that the vulnerability mainly lies in the ubiquitous on-board diagnostics II (OBD-II) interface and the memory configuration within ECU. Countermeasures using obfuscation and encryption techniques are introduced to protect ECUs from data sniffing and code tampering. A security scheme of deploying lures that look like ECU vulnerabilities to deceive lurking intruders into installing rootkits is proposed. We show that the interactions between the attacker and the system can be modeled as a Markov decision process (MDP).
现代嵌入式车辆系统是基于网络架构的。来自车载通信的漏洞是重要的。车辆电子控制单元(ecu)需要隐私和安全措施。通过安全漏洞分析,发现漏洞主要存在于无处不在的车载诊断II (OBD-II)接口和ECU内部的内存配置中。引入了使用混淆和加密技术的对策来保护ecu免受数据嗅探和代码篡改。提出了一种部署看起来像ECU漏洞的诱饵来欺骗潜伏的入侵者安装rootkit的安全方案。我们展示了攻击者和系统之间的交互可以建模为马尔可夫决策过程(MDP)。
{"title":"Automobile ECU Design to Avoid Data Tampering","authors":"Lu Yu, Juan Deng, R. Brooks, S. Yun","doi":"10.1145/2746266.2746276","DOIUrl":"https://doi.org/10.1145/2746266.2746276","url":null,"abstract":"Modern embedded vehicle systems are based on network architectures. Vulnerabilities from in-vehicle communications are significant. Privacy and security measures are required for vehicular Electronic Control Units (ECUs). We present a security vulnerability analysis, which shows that the vulnerability mainly lies in the ubiquitous on-board diagnostics II (OBD-II) interface and the memory configuration within ECU. Countermeasures using obfuscation and encryption techniques are introduced to protect ECUs from data sniffing and code tampering. A security scheme of deploying lures that look like ECU vulnerabilities to deceive lurking intruders into installing rootkits is proposed. We show that the interactions between the attacker and the system can be modeled as a Markov decision process (MDP).","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems 使用控制论计算模型的风险和脆弱性评估:为工业控制系统量身定制
R. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher
In cybersecurity, there are many influencing economic factors to weigh. This paper considers the defender-practitioner stakeholder points-of-view that involve cost combined with development and deployment considerations. Some examples include the cost of countermeasures, training and maintenance as well as the lost opportunity cost and actual damages associated with a compromise. The return on investment (ROI) from countermeasures comes from saved impact costs (i.e., losses from violating availability, integrity, confidentiality or privacy requirements). A measured approach that informs cybersecurity practice is pursued toward maximizing ROI. To this end for example, ranking threats based on their potential impact focuses security mitigation and control investments on the highest value assets, which represent the greatest potential losses. The traditional approach uses risk exposure (calculated by multiplying risk probability by impact). To address this issue in terms of security economics, we introduce the notion of Cybernomics. Cybernomics considers the cost/benefits to the attacker/defender to estimate risk exposure. As the first step, we discuss the likelihood that a threat will emerge and whether it can be thwarted and if not what will be the cost (losses both tangible and intangible). This impact assessment can provide key information for ranking cybersecurity threats and managing risk.
在网络安全中,有许多影响经济因素需要权衡。本文考虑了涉及成本与开发和部署考虑相结合的防御者-实践者利益相关者的观点。一些例子包括反措施、培训和维护的成本,以及失去的机会成本和与妥协有关的实际损害。对策的投资回报(ROI)来自于节省的影响成本(即,因违反可用性、完整性、机密性或隐私要求而造成的损失)。一种可测量的方法,为网络安全实践提供信息,以实现投资回报率最大化。例如,为此目的,根据威胁的潜在影响对其进行排名,将安全缓解和控制投资集中在价值最高的资产上,这些资产代表着最大的潜在损失。传统方法使用风险暴露(通过将风险概率乘以影响来计算)。为了从安全经济学的角度解决这个问题,我们引入了控制论的概念。控制论考虑攻击者/防御者的成本/收益来评估风险暴露。作为第一步,我们讨论威胁出现的可能性,是否可以阻止它,如果不能,成本将是什么(有形和无形的损失)。这种影响评估可以为网络安全威胁排名和风险管理提供关键信息。
{"title":"Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems","authors":"R. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher","doi":"10.1145/2746266.2746284","DOIUrl":"https://doi.org/10.1145/2746266.2746284","url":null,"abstract":"In cybersecurity, there are many influencing economic factors to weigh. This paper considers the defender-practitioner stakeholder points-of-view that involve cost combined with development and deployment considerations. Some examples include the cost of countermeasures, training and maintenance as well as the lost opportunity cost and actual damages associated with a compromise. The return on investment (ROI) from countermeasures comes from saved impact costs (i.e., losses from violating availability, integrity, confidentiality or privacy requirements). A measured approach that informs cybersecurity practice is pursued toward maximizing ROI. To this end for example, ranking threats based on their potential impact focuses security mitigation and control investments on the highest value assets, which represent the greatest potential losses. The traditional approach uses risk exposure (calculated by multiplying risk probability by impact). To address this issue in terms of security economics, we introduce the notion of Cybernomics. Cybernomics considers the cost/benefits to the attacker/defender to estimate risk exposure. As the first step, we discuss the likelihood that a threat will emerge and whether it can be thwarted and if not what will be the cost (losses both tangible and intangible). This impact assessment can provide key information for ranking cybersecurity threats and managing risk.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Android Malware Static Analysis Techniques Android恶意软件静态分析技术
Suzanna E. Schmeelk, Junfeng Yang, A. Aho
During 2014, Business Insider announced that there are over a billion users of Android worldwide. Government officials are also trending towards acquiring Android mobile devices. Google's application architecture is already ubiquitous and will keep expanding. The beauty of an application-based architecture is the flexibility, interoperability and customizability it provides users. This same flexibility, however, also allows and attracts malware development. This paper provides a horizontal research analysis of techniques used for Android application malware analysis. The paper explores techniques used by Android malware static analysis methodologies. It examines the key analysis efforts used by examining applications for permission leakage and privacy concerns. The paper concludes with a discussion of some gaps of current malware static analysis research.
2014年,Business Insider宣布全球有超过10亿Android用户。政府官员也倾向于购买安卓手机。b谷歌的应用程序体系结构已经无处不在,并将继续扩展。基于应用程序的体系结构的美妙之处在于它为用户提供的灵活性、互操作性和可定制性。然而,同样的灵活性也允许并吸引了恶意软件的开发。本文对Android应用程序恶意软件分析技术进行了横向研究分析。本文探讨了Android恶意软件静态分析方法所使用的技术。它通过检查应用程序的权限泄漏和隐私问题来检查使用的关键分析工作。最后,对当前恶意软件静态分析研究的一些不足进行了讨论。
{"title":"Android Malware Static Analysis Techniques","authors":"Suzanna E. Schmeelk, Junfeng Yang, A. Aho","doi":"10.1145/2746266.2746271","DOIUrl":"https://doi.org/10.1145/2746266.2746271","url":null,"abstract":"During 2014, Business Insider announced that there are over a billion users of Android worldwide. Government officials are also trending towards acquiring Android mobile devices. Google's application architecture is already ubiquitous and will keep expanding. The beauty of an application-based architecture is the flexibility, interoperability and customizability it provides users. This same flexibility, however, also allows and attracts malware development. This paper provides a horizontal research analysis of techniques used for Android application malware analysis. The paper explores techniques used by Android malware static analysis methodologies. It examines the key analysis efforts used by examining applications for permission leakage and privacy concerns. The paper concludes with a discussion of some gaps of current malware static analysis research.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124902464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions 车载网络:攻击、漏洞和建议的解决方案
Paulsohn Carsten, T. Andel, M. Yampolskiy, J. McDonald
Vehicles made within the past years have gradually become more and more complex. As a result, the embedded computer systems that monitor and control these systems have also grown in size and complexity. Unfortunately, the technology that protects them from external attackers has not improved at a similar rate. In this paper we discuss the vulnerabilities of modern in-vehicle networks, focusing on the Controller Area Network (CAN) communications protocol as a primary attack vector. We discuss the vulnerabilities of CAN, the types of attacks that can be used against it, and some of the solutions that have been proposed to overcome these attacks.
过去几年制造的车辆逐渐变得越来越复杂。因此,监视和控制这些系统的嵌入式计算机系统的规模和复杂性也在增长。不幸的是,保护它们免受外部攻击的技术并没有以类似的速度进步。本文讨论了现代车载网络的漏洞,重点讨论了控制器局域网(CAN)通信协议作为主要攻击载体。我们讨论了CAN的漏洞,可以用来对付它的攻击类型,以及已经提出的一些解决方案来克服这些攻击。
{"title":"In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions","authors":"Paulsohn Carsten, T. Andel, M. Yampolskiy, J. McDonald","doi":"10.1145/2746266.2746267","DOIUrl":"https://doi.org/10.1145/2746266.2746267","url":null,"abstract":"Vehicles made within the past years have gradually become more and more complex. As a result, the embedded computer systems that monitor and control these systems have also grown in size and complexity. Unfortunately, the technology that protects them from external attackers has not improved at a similar rate. In this paper we discuss the vulnerabilities of modern in-vehicle networks, focusing on the Controller Area Network (CAN) communications protocol as a primary attack vector. We discuss the vulnerabilities of CAN, the types of attacks that can be used against it, and some of the solutions that have been proposed to overcome these attacks.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Authentication Bypass and Remote Escalated I/O Command Attacks 认证绕过和远程升级I/O命令攻击
Ryan Grandgenett, W. Mahoney, R. Gandhi
The Common Industrial Protocol (CIP) is a widely used Open DeviceNet Vendors Association (ODVA) standard [14]. CIP is an application-level protocol for communication between components in an industrial control setting such as a Supervisory Control And Data Acquisition (SCADA) environment. We present exploits for authentication and privileged I/O in a CIP implementation. In particular, Allen Bradley's implementation of CIP communications between its programming software and Programmable Logic Controllers (PLCs) is the target of our exploits. Allen Bradley's RSLogix 5000 software supports programming and centralized monitoring of Programmable Logic Controllers (PLCs) from a desktop computer. In our test bed, ControlLogix EtherNet/IP Web Server Module (1756-EWEB) allows the PLC Module (5573-Logix) to be programmed, monitored and controlled by RSLogix 5000 over an Ethernet LAN. Our vulnerability discovery process included examination of CIP network traffic and reverse engineering the RSLogix 5000 software. Our findings have led to the discovery of several vulnerabilities in the protocol, including denial-of-service attacks, but more significantly and recently the creation of an authentication bypass and remote escalated privileged I/O command exploit. The exploit abuses RSLogix 5000's use of hard-coded credentials for outbound communication with other SCADA components. This paper provides a first public disclosure of the vulnerability, exploit development process, and results.
通用工业协议(CIP)是一种广泛使用的开放设备网络供应商协会(ODVA)标准[14]。CIP是一种应用级协议,用于工业控制设置(如监控和数据采集(SCADA)环境)中组件之间的通信。我们提出了一个CIP实现中的身份验证和特权I/O漏洞。特别是,Allen Bradley在其编程软件和可编程逻辑控制器(plc)之间实现CIP通信是我们利用的目标。Allen Bradley的RSLogix 5000软件支持从台式计算机对可编程逻辑控制器(plc)进行编程和集中监控。在我们的测试平台中,ControlLogix以太网/IP Web服务器模块(1756-EWEB)允许PLC模块(5573-Logix)通过以太网LAN由RSLogix 5000编程,监视和控制。我们的漏洞发现过程包括检查CIP网络流量和对RSLogix 5000软件进行逆向工程。我们的发现导致在协议中发现了几个漏洞,包括拒绝服务攻击,但更重要的是,最近创建了身份验证绕过和远程升级特权I/O命令利用。该漏洞滥用RSLogix 5000使用硬编码凭据与其他SCADA组件进行出站通信。本文首次公开了漏洞、开发过程和结果。
{"title":"Authentication Bypass and Remote Escalated I/O Command Attacks","authors":"Ryan Grandgenett, W. Mahoney, R. Gandhi","doi":"10.1145/2746266.2746268","DOIUrl":"https://doi.org/10.1145/2746266.2746268","url":null,"abstract":"The Common Industrial Protocol (CIP) is a widely used Open DeviceNet Vendors Association (ODVA) standard [14]. CIP is an application-level protocol for communication between components in an industrial control setting such as a Supervisory Control And Data Acquisition (SCADA) environment. We present exploits for authentication and privileged I/O in a CIP implementation. In particular, Allen Bradley's implementation of CIP communications between its programming software and Programmable Logic Controllers (PLCs) is the target of our exploits. Allen Bradley's RSLogix 5000 software supports programming and centralized monitoring of Programmable Logic Controllers (PLCs) from a desktop computer. In our test bed, ControlLogix EtherNet/IP Web Server Module (1756-EWEB) allows the PLC Module (5573-Logix) to be programmed, monitored and controlled by RSLogix 5000 over an Ethernet LAN. Our vulnerability discovery process included examination of CIP network traffic and reverse engineering the RSLogix 5000 software. Our findings have led to the discovery of several vulnerabilities in the protocol, including denial-of-service attacks, but more significantly and recently the creation of an authentication bypass and remote escalated privileged I/O command exploit. The exploit abuses RSLogix 5000's use of hard-coded credentials for outbound communication with other SCADA components. This paper provides a first public disclosure of the vulnerability, exploit development process, and results.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems 防止网络对网络-物理系统造成不可逆转的物理损害
Jaewon Yang, Xiuwen Liu, Shamik Bose
Ever since the discovery of the Stuxnet malware, there have been widespread concerns about disasters via cyber-induced physical damage on critical infrastructures. Cyber physical systems (CPS) integrate computation and physical processes; such infrastructure systems are examples of cyber-physical systems, where computation and physical processes are integrated to optimize resource usage and system performance. The inherent security weaknesses of computerized systems and increased connectivity could allow attackers to alter the systems' behavior and cause irreversible physical damage, or even worse cyber-induced disasters. However, existing security measures were mostly developed for cyber-only systems and they cannot be effectively applied to CPS directly. Thus, new approaches to preventing cyber physical system disasters are essential. We recognize very different characteristics of cyber and physical components in CPS, where cyber components are flexible with large attack surfaces while physical components are inflexible and relatively simple with very small attack surfaces. This research focuses on the components where cyber and physical components interact. Securing cyber-physical interfaces will complete a layer-based defense strategy in the "Defense in Depth Framework". In this paper we propose Trusted Security Modules as a systematic solution to provide a guarantee of preventing cyber-induced physical damage even when operating systems and controllers are compromised. TSMs will be placed at the interface between cyber and physical components by adapting the existing integrity enforcing mechanisms such as Trusted Platform Module, Control-Flow Integrity, and Data-Flow Integrity.
自从Stuxnet恶意软件被发现以来,人们普遍担心网络会对关键基础设施造成物理破坏。网络物理系统(CPS)集成了计算和物理过程;这样的基础设施系统是网络物理系统的例子,其中计算和物理过程集成以优化资源使用和系统性能。计算机化系统固有的安全弱点和增加的连接性可能允许攻击者改变系统的行为,造成不可逆转的物理破坏,甚至更糟糕的网络引发的灾难。然而,现有的安全措施大多是为网络系统开发的,不能直接有效地应用于CPS。因此,预防网络物理系统灾难的新方法至关重要。我们认识到CPS中的网络组件和物理组件具有非常不同的特征,其中网络组件在大型攻击面时具有灵活性,而物理组件在很小的攻击面时不灵活且相对简单。本研究的重点是网络和物理组件相互作用的组件。保护网络物理接口将完成“纵深防御框架”中基于层的防御策略。在本文中,我们提出可信安全模块作为一种系统的解决方案,即使在操作系统和控制器受到损害时,也可以提供防止网络引起的物理损坏的保证。通过采用现有的完整性执行机制,如可信平台模块、控制流完整性和数据流完整性,tsm将被放置在网络和物理组件之间的接口上。
{"title":"Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems","authors":"Jaewon Yang, Xiuwen Liu, Shamik Bose","doi":"10.1145/2746266.2746274","DOIUrl":"https://doi.org/10.1145/2746266.2746274","url":null,"abstract":"Ever since the discovery of the Stuxnet malware, there have been widespread concerns about disasters via cyber-induced physical damage on critical infrastructures. Cyber physical systems (CPS) integrate computation and physical processes; such infrastructure systems are examples of cyber-physical systems, where computation and physical processes are integrated to optimize resource usage and system performance. The inherent security weaknesses of computerized systems and increased connectivity could allow attackers to alter the systems' behavior and cause irreversible physical damage, or even worse cyber-induced disasters. However, existing security measures were mostly developed for cyber-only systems and they cannot be effectively applied to CPS directly. Thus, new approaches to preventing cyber physical system disasters are essential. We recognize very different characteristics of cyber and physical components in CPS, where cyber components are flexible with large attack surfaces while physical components are inflexible and relatively simple with very small attack surfaces. This research focuses on the components where cyber and physical components interact. Securing cyber-physical interfaces will complete a layer-based defense strategy in the \"Defense in Depth Framework\". In this paper we propose Trusted Security Modules as a systematic solution to provide a guarantee of preventing cyber-induced physical damage even when operating systems and controllers are compromised. TSMs will be placed at the interface between cyber and physical components by adapting the existing integrity enforcing mechanisms such as Trusted Platform Module, Control-Flow Integrity, and Data-Flow Integrity.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133110576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 10th Annual Cyber and Information Security Research Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1