2019 IEEE 15th International Conference on Control and Automation (ICCA) 2019
DOI: 10.1109/icca.2019.8899564
|View full text |Cite
|
Sign up to set email alerts
|

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…Cyber-attacks against ICS have increased in the frequency and sophistication of tactics to avoid detection mechanisms. Firoozjaei et al [ 24 ] demonstrated the adversarial tactics and analyzed the attack mechanisms of six significant real-world ICS cyber incidents in the energy and power industries, namely Stuxnet [ 25 ], BlackEnergy [ 26 ], Crashoverride [ 27 ], Triton, Irongate, and Havex [ 28 ]. He provided an evaluation framework for each attack’s threat level of ICS malware and introduced a weighting scheme to rank their influences on ICS.…”
Section: Related Workmentioning
confidence: 99%
“…Cyber-attacks against ICS have increased in the frequency and sophistication of tactics to avoid detection mechanisms. Firoozjaei et al [ 24 ] demonstrated the adversarial tactics and analyzed the attack mechanisms of six significant real-world ICS cyber incidents in the energy and power industries, namely Stuxnet [ 25 ], BlackEnergy [ 26 ], Crashoverride [ 27 ], Triton, Irongate, and Havex [ 28 ]. He provided an evaluation framework for each attack’s threat level of ICS malware and introduced a weighting scheme to rank their influences on ICS.…”
Section: Related Workmentioning
confidence: 99%
“…Proposed countermeasures include shielding electronic laptop components, performing I/O operations randomly to mask electromagnetic emissions and, on the mobile phone side, to make it mandatory for applications to request permissions to access magnetic sensors (which has meanwhile been implemented in most recent mobile operating systems). Robles-Durazno et al [12] used two lamps connected to a programmable logic controller (PLC) for data exfiltration from an Industrial Automation and Control System. The inability for humans to detect flickering in the order of 60Hz was taken into account, in order to avoid detection and make it a stealthy process.…”
Section: A Review Of Side Channel Exfiltrationmentioning
confidence: 99%
“…To improve stealthiness, several strategies can be adopted. The most basic is to resort to light fixtures placed in spaces where the blinking would not call the attention of building occupants, or to adjust the blinking frequency to make it imperceptible to the human eye (as explored by [12], in a different scope). A more stealthy approach may be implemented if a dimmer is present.…”
Section: Using the Lighting System To Exfiltrate Datamentioning
confidence: 99%
“…In the described example, sensitive information were transmitted via memory-mapped peripherals such as LED by copying data from arbitrary memory locations via the DMA controller. Similarly, the Waterleakabe malware [175] relied on the optical side-channel to achieve transmission of the sensor readings from lamps. Note that the lamps should be connected to the digital output of the PLC and the compromised video recorder camera should be placed one meter away.…”
Section: F Side Channel Analysismentioning
confidence: 99%