Back to Search Start Over

Industrial Control Systems Security via Runtime Enforcement.

Authors :
LANOTTE, RUGGERO
MERRO, MASSIMO
MUNTEANU, ANDREI
Source :
ACM Transactions on Privacy & Security; Nov2022, Vol. 26 Issue 1, p1-41, 41p
Publication Year :
2022

Abstract

With the advent of Industry 4.0, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, increasingly interconnected and therefore exposed to cyber-physical attacks, i.e., security breaches in cyberspace that may adversely affect the physical processes underlying industrial control systems. In this article, we propose a formal approach based on runtime enforcement to ensure specification compliance in networks of controllers, possibly compromised by colluding malware that may locally tamper with actuator commands, sensor readings, and inter-controller communications. Our approach relies on an adhoc sub-class of Ligatti et al.'s edit automata to enforce controllers represented in Hennessy and Regan's Timed Process Language. We define a synthesis algorithm that, given an alphabet P of observable actions and a timed correctness property e, returns a monitor that enforces the property e during the execution of any (potentially corrupted) controller with alphabet P, and complying with the property e. Our monitors do mitigation by correcting and suppressing incorrect actions of corrupted controllers and by generating actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical requirements, such as transparency and soundness, the proposed enforcement enjoys deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers. Finally, we test the proposed enforcement mechanism on a non-trivial case study, taken from the context of industrialwater treatment systems, in which the controllers are injected with different malware with different malicious goals. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
24712566
Volume :
26
Issue :
1
Database :
Complementary Index
Journal :
ACM Transactions on Privacy & Security
Publication Type :
Academic Journal
Accession number :
160222004
Full Text :
https://doi.org/10.1145/3546579