首页 > 最新文献

Proceedings of the 4th ACM Workshop on Cyber-Physical System Security最新文献

英文 中文
Session details: Keynote 2 会议详情:主题演讲2
A. Mathur
{"title":"Session details: Keynote 2","authors":"A. Mathur","doi":"10.1145/3258580","DOIUrl":"https://doi.org/10.1145/3258580","url":null,"abstract":"","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks 理解SCADA网络中的IEC-60870-5-104流量模式
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198460
Chih-Yuan Lin, S. Nadjm-Tehrani
The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As the importance of SCADA security is growing, characterization and modeling of SCADA traffic for developing defense mechanisms based on the regularity of the polling mechanism used in SCADA systems has been studied, whereas the characterization of traffic caused by non-polling mechanisms, such as spontaneous events, has not yet been studied. This paper provides a first look at how the traffic flowing between SCADA components changes over time. It proposes a method built upon Probabilistic Suffix Tree (PST) to discover the underlying timing patterns of spontaneous events. In 11 out of 14 tested data sequences, we see evidence of existence of underlying patterns. Next, the prediction capability of the approach, useful for devising anomaly detection mechanisms, was studied. While some data patterns enable an 80% prediction possibility, more work is needed to tune the method for higher accuracy.
IEC-60870-5-104 (IEC-104)协议通常用于监控和数据采集(SCADA)网络,用于操作关键基础设施,如发电站。随着SCADA安全的重要性日益提高,基于SCADA系统中使用的轮询机制的规律性,对SCADA流量进行表征和建模以开发防御机制已经得到了研究,而对非轮询机制(如自发事件)引起的流量进行表征则尚未得到研究。本文首先介绍了SCADA组件之间的流量如何随时间变化。提出了一种基于概率后缀树(PST)的方法来发现自发事件的潜在时序模式。在14个测试数据序列中的11个中,我们看到了存在潜在模式的证据。其次,研究了该方法的预测能力,有助于设计异常检测机制。虽然一些数据模式支持80%的预测可能性,但需要做更多的工作来调整方法以获得更高的准确性。
{"title":"Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks","authors":"Chih-Yuan Lin, S. Nadjm-Tehrani","doi":"10.1145/3198458.3198460","DOIUrl":"https://doi.org/10.1145/3198458.3198460","url":null,"abstract":"The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As the importance of SCADA security is growing, characterization and modeling of SCADA traffic for developing defense mechanisms based on the regularity of the polling mechanism used in SCADA systems has been studied, whereas the characterization of traffic caused by non-polling mechanisms, such as spontaneous events, has not yet been studied. This paper provides a first look at how the traffic flowing between SCADA components changes over time. It proposes a method built upon Probabilistic Suffix Tree (PST) to discover the underlying timing patterns of spontaneous events. In 11 out of 14 tested data sequences, we see evidence of existence of underlying patterns. Next, the prediction capability of the approach, useful for devising anomaly detection mechanisms, was studied. While some data patterns enable an 80% prediction possibility, more work is needed to tune the method for higher accuracy.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"79 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Towards Security-Aware Virtual Environments for Digital Twins 面向数字孪生体的安全感知虚拟环境
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198464
Matthias Eckhart, Andreas Ekelhart
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.
数字孪生在监测、模拟、优化和预测网络物理系统(cps)状态方面开辟了新的可能性。此外,我们认为CPS的全功能虚拟副本也可以在保护系统方面发挥重要作用。在这项工作中,我们提出了一个框架,允许用户创建和执行数字双胞胎,与其物理对应物紧密匹配。我们重点研究了一种利用工程数据交换格式从规范中自动生成虚拟环境的新方法。从安全的角度来看,一个相同的(就系统规范而言)模拟环境可以由安全专业人员自由地探索和测试,而不会对实际系统产生负面影响。更进一步,框架之上的安全模块支持安全分析人员监视cps的当前状态。我们在概念验证中展示了该框架的可行性,包括自动生成数字孪生和监控安全和安全规则。
{"title":"Towards Security-Aware Virtual Environments for Digital Twins","authors":"Matthias Eckhart, Andreas Ekelhart","doi":"10.1145/3198458.3198464","DOIUrl":"https://doi.org/10.1145/3198458.3198464","url":null,"abstract":"Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
SARA: Security Automotive Risk Analysis Method 安全汽车风险分析方法
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198465
J. Monteuuis, Aymen Boudguiga, Jun Zhang, H. Labiod, Alain Servel, P. Urien
Connected and automated vehicles aim to improve the comfort and the safety of the driver and passengers. To this end, car manufacturers continually improve actual standardized methods to ensure their customers safety, privacy, and vehicles security. However, these methods do not support fully autonomous vehicles, linkability and confusion threats. To address such gaps, we propose a systematic threat analysis and risk assessment framework, SARA, which comprises an improved threat model, a new attack method/asset map, the involvement of the attacker in the attack tree, and a new driving system observation metric. Finally, we demonstrate its feasibility in assessing risk with two use cases: Vehicle Tracking and Comfortable Emergency Brake Failure.
联网和自动驾驶汽车旨在提高驾驶员和乘客的舒适度和安全性。为此,汽车制造商不断改进实际的标准化方法,以确保客户的安全、隐私和车辆的安全。然而,这些方法不支持完全自动驾驶汽车、可链接性和混淆威胁。为了解决这些问题,我们提出了一个系统的威胁分析和风险评估框架SARA,该框架包括改进的威胁模型、新的攻击方法/资产图、攻击者在攻击树中的参与以及新的驾驶系统观察度量。最后,通过车辆跟踪和舒适紧急制动故障两个用例验证了该方法在风险评估中的可行性。
{"title":"SARA: Security Automotive Risk Analysis Method","authors":"J. Monteuuis, Aymen Boudguiga, Jun Zhang, H. Labiod, Alain Servel, P. Urien","doi":"10.1145/3198458.3198465","DOIUrl":"https://doi.org/10.1145/3198458.3198465","url":null,"abstract":"Connected and automated vehicles aim to improve the comfort and the safety of the driver and passengers. To this end, car manufacturers continually improve actual standardized methods to ensure their customers safety, privacy, and vehicles security. However, these methods do not support fully autonomous vehicles, linkability and confusion threats. To address such gaps, we propose a systematic threat analysis and risk assessment framework, SARA, which comprises an improved threat model, a new attack method/asset map, the involvement of the attacker in the attack tree, and a new driving system observation metric. Finally, we demonstrate its feasibility in assessing risk with two use cases: Vehicle Tracking and Comfortable Emergency Brake Failure.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123381925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around) 泄漏的CPS:从物理属性推断网络信息(反之亦然)
Pub Date : 2018-05-22 DOI: 10.1145/3198458.3198468
M. Conti
The nature of Cyber-physical systems (CPS) is to integrate physical environments with computing capabilities, building a "channel" between the physical and the cyber world, with a continuous exchange of data and commands. From this inherent behaviour, observing data/behaviour on one side might lead to leakage of information about the status of the other side. This could be leveraged for both benign and malicious purposes. In this talk, we focus on this issue, discussing some of the core approaches and representative scenarios.
信息物理系统(CPS)的本质是将物理环境与计算能力相结合,在物理世界和网络世界之间建立一个“通道”,不断交换数据和命令。从这种固有行为来看,观察一方的数据/行为可能会导致关于另一方状态的信息泄露。这既可以用于良性目的,也可以用于恶意目的。在这次演讲中,我们将重点讨论这个问题,讨论一些核心方法和代表性场景。
{"title":"Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)","authors":"M. Conti","doi":"10.1145/3198458.3198468","DOIUrl":"https://doi.org/10.1145/3198458.3198468","url":null,"abstract":"The nature of Cyber-physical systems (CPS) is to integrate physical environments with computing capabilities, building a \"channel\" between the physical and the cyber world, with a continuous exchange of data and commands. From this inherent behaviour, observing data/behaviour on one side might lead to leakage of information about the status of the other side. This could be leveraged for both benign and malicious purposes. In this talk, we focus on this issue, discussing some of the core approaches and representative scenarios.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116741214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security 第四届美国计算机学会网络物理系统安全研讨会论文集
Jianying Zhou, Douglas Jones
It is our great pleasure to welcome you to CPSS 2017, the third ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2017 and held in Abu Dhabi, UAE on 2 April 2017. The call for papers attracted 35 submissions from 23 countries: Algeria, Australia, Austria, Belgium, Canada, China, Croatia, Denmark, France, Germany, Greece, India, Israel, Korea, Kuwait, Netherlands, New Zealand, Portugal, Singapore, Sweden, UAE, UK and USA. These papers were evaluated on the basis of their significance, novelty, technical quality and practical impact. The review process was double-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received 4 reviews. Finally we accepted 10 papers for presentation at the workshop, with an acceptance rate of 29%. As announced in the CFP, there will be a best paper award, to encourage more high quality submissions to CPSS. The winner will be revealed at the closing session of the workshop, and also listed at the CPSS home page http://jianying.space/cpss/. Besides the 10 technical presentations, there are also 2 keynote speeches. These valuable and insightful talks will guide us to a better understanding of CPS security challenges and opportunities. "On the Disappearing Boundary between Digital, Physical, and Social Spaces -- Who, what, where and when" by Prof. Bashar Nuseibeh (Lero, Ireland & The Open University, UK) "Security of the Autonomous Ship" by Prof. Sokratis Katsikas (NTNU, Norway)
我们非常高兴欢迎您参加2017年4月2日在阿联酋阿布扎比举行的第三届ACM网络物理系统安全研讨会CPSS。本次征文共收到来自23个国家的35份意见书:阿尔及利亚、澳大利亚、奥地利、比利时、加拿大、中国、克罗地亚、丹麦、法国、德国、希腊、印度、以色列、韩国、科威特、荷兰、新西兰、葡萄牙、新加坡、瑞典、阿联酋、英国和美国。根据论文的意义、新颖性、技术质量和实际影响对其进行评价。该评价过程是双盲的。项目委员会成员在论文评审方面付出了巨大的努力,大部分论文都收到了4次审稿。最终我们接受了10篇论文在研讨会上发表,接受率为29%。正如CFP所宣布的那样,将设立最佳论文奖,以鼓励更多高质量的论文提交给CPSS。获奖者将在研讨会闭幕时公布,并在CPSS主页http://jianying.space/cpss/上公布。除了10场技术演讲外,还有2场主题演讲。这些有价值和深刻见解的演讲将引导我们更好地了解CPS安全挑战和机遇。“关于数字、物理和社会空间之间正在消失的边界——谁、什么、在哪里、何时”,作者:Bashar Nuseibeh教授(爱尔兰莱罗和英国开放大学)Sokratis Katsikas教授(挪威理工大学)“自主船舶的安全”
{"title":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","authors":"Jianying Zhou, Douglas Jones","doi":"10.1145/3198458","DOIUrl":"https://doi.org/10.1145/3198458","url":null,"abstract":"It is our great pleasure to welcome you to CPSS 2017, the third ACM Cyber-Physical System Security Workshop, co-located with ACM AsiaCCS 2017 and held in Abu Dhabi, UAE on 2 April 2017. \u0000 \u0000The call for papers attracted 35 submissions from 23 countries: Algeria, Australia, Austria, Belgium, Canada, China, Croatia, Denmark, France, Germany, Greece, India, Israel, Korea, Kuwait, Netherlands, New Zealand, Portugal, Singapore, Sweden, UAE, UK and USA. These papers were evaluated on the basis of their significance, novelty, technical quality and practical impact. The review process was double-blinded. The program committee members have put in a significant effort in paper evaluation, and most of the papers received 4 reviews. Finally we accepted 10 papers for presentation at the workshop, with an acceptance rate of 29%. As announced in the CFP, there will be a best paper award, to encourage more high quality submissions to CPSS. The winner will be revealed at the closing session of the workshop, and also listed at the CPSS home page http://jianying.space/cpss/. \u0000 \u0000Besides the 10 technical presentations, there are also 2 keynote speeches. These valuable and insightful talks will guide us to a better understanding of CPS security challenges and opportunities. \u0000\"On the Disappearing Boundary between Digital, Physical, and Social Spaces -- Who, what, where and when\" by Prof. Bashar Nuseibeh (Lero, Ireland & The Open University, UK) \u0000\"Security of the Autonomous Ship\" by Prof. Sokratis Katsikas (NTNU, Norway)","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1