Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy 2017
DOI: 10.1145/3140241.3140254
|View full text |Cite
|
Sign up to set email alerts
|

On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

Abstract: The exploitation of Industrial Control Systems (ICSs) has been described as both easy and impossible, where is the truth? PostStuxnet works have included a plethora of ICS focused cyber security research activities, with topics covering device maturity, network protocols, and overall cyber security culture. We often hear the notion of ICSs being highly vulnerable due to a lack of inbuilt security mechanisms, considered a low hanging fruit to a variety of low skilled threat actors. While there is substantial ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 33 publications
(43 citation statements)
references
References 11 publications
0
38
0
Order By: Relevance
“…Now, let's conduct exploitation on ICS protocol vulnerabilities. Green et al [70] employed the testbed environment to conduct man-in-the-middle attack experiments against ICS systems, showing the importance of understanding the process when conducting targeted ICS attacks. However, what if we have little knowledge of the operating mechanism of ICS, and we just employ the ICS protocol vulnerabilities, can we successfully implement a attack?…”
Section: B Proof Of Conceptmentioning
confidence: 99%
“…Now, let's conduct exploitation on ICS protocol vulnerabilities. Green et al [70] employed the testbed environment to conduct man-in-the-middle attack experiments against ICS systems, showing the importance of understanding the process when conducting targeted ICS attacks. However, what if we have little knowledge of the operating mechanism of ICS, and we just employ the ICS protocol vulnerabilities, can we successfully implement a attack?…”
Section: B Proof Of Conceptmentioning
confidence: 99%
“…We now discuss the anatomy of the attack we have implemented on this converged OT-IIoT environment as modelled within our testbed. It is an evolution of our previous work on attacks in ICS environments [7]. The flow of the attack can be seen in Figure 9.…”
Section: Attack Overviewmentioning
confidence: 99%
“…Step 1-The Thingworx cloud platform is compromised by exploiting one or more of the well known CVE vulnerabilities published 9 https://www.ptc.com/en/products/iiot 10 https://www.symantec.com/blogs/threat-intelligence/asus-supply-chain-attack for Tomcat 8.5 11 in the pre-configured state as shipped. In this state we are able to load our attack script to the Thingworx VM which, when executed, terminates the Thingworx process resulting in a loss of communication with Kepware.…”
Section: Compromising the Seccniot Demonstratormentioning
confidence: 99%
“…Over the last five years, we have designed and constructed ICS testbeds to support cyber security research. Our initial concepts, built out of Lancaster University [10], formed a starting point for the exploration of vulnerability scanners [1], intrusion detection systems [14], process comprehension [11], etc. This culminated in a set of design principles and lessons learnt, formulated to support other researchers in the design and construction of their own ICS testbeds [12].…”
Section: Introductionmentioning
confidence: 99%