2016 Resilience Week (RWS) 2016
DOI: 10.1109/rweek.2016.7573309
|View full text |Cite
|
Sign up to set email alerts
|

Detecting PLC control corruption via on-device runtime verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…When this variable is true, a subroutine UPDATE PART(int) is called to conduct a 15step I/O operation on the RFID attached to the part (Ln. [36][37][38][39]. When this is done, the subroutine (Ln.47-60) will receive a RFID IO Complete signal and then notify its caller by setting the Boolean variable Update Complete.…”
Section: A Motivating Examplementioning
confidence: 99%
See 2 more Smart Citations
“…When this variable is true, a subroutine UPDATE PART(int) is called to conduct a 15step I/O operation on the RFID attached to the part (Ln. [36][37][38][39]. When this is done, the subroutine (Ln.47-60) will receive a RFID IO Complete signal and then notify its caller by setting the Boolean variable Update Complete.…”
Section: A Motivating Examplementioning
confidence: 99%
“…Many prior efforts [24], [28], [30], [31], [42], [44], [57], [58], [61], [63], [65] have been made to statically verify logic code using model checkers [15], [21]. Further efforts have also been made to conduct runtime verification in an online [39], [45] or offline manner [35], [62]. More recently, symbolic execution [43], [54] has been enabled on PLC code.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although being effective in some settings, existing defense approaches against PLC-oriented attacks have the following key limitations. Firstly, defending approaches adopted by intrusion detection systems (IDSs) [9][10][11] , deception defense [12][13][14] and attestation [15][16][17][18][19] take effect after attacks happened, mainly detecting them but not blocking them, while blocking technologies such as industrial firewalls alone are not able to effectively block growing sophisticated attacks [20][21][22] . Secondly, most existing approaches are designed based on the characteristics of one or several specific kinds of known attacks, such as [9,13,15].…”
Section: Introductionmentioning
confidence: 99%
“…To address these issues, in this paper, we present a novel proactive and PLC-compatible defense mechanism, called Heterogeneous Redundant Proactive Defense Framework (HRPDF). Unlike existing approaches [13,[15][16][17]23] , HRPDF is designed to actively defend against a variety of attacks targeting the core software stack of PLC, including 1) firmware modification attacks (firmware level), 2) control logic tampering attacks (logic application level), and 3) PLC memory attacks (memory level). The success of HRPDF mainly depends on a novel software redundancy framework laying in multiple levels of the PLC's software stack.…”
Section: Introductionmentioning
confidence: 99%