对可编程逻辑控制器的Frimware修改攻击

ID:23771

大小:0.82 MB

页数:9页

时间:2022-11-30

金币:20

上传者:战必胜
www.elsevier.com/locate/ijcip
Available online at www.sciencedirect.com
Firmware modication attacks on programmable
logic controllers
Zachry Basnight, Jonathan Butts
n
, Juan Lopez Jr., Thomas Dube
Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio 45433, USA
article info
Article history:
Received 12 January 2013
Accepted 18 April 2013
Available online 2 May 2013
Keywords:
Industrial control systems
Programmable logic controllers
Firmware
Modication attacks
Reverse engineering
abstract
Recent attacks on industrial control systems, such as the highly publicized Stuxnet
malware, have intensied a race to the bottom where lower-level attacks have a tactical
advantage. Programmable logic controller (PLC) rmware, which provides a software-
driven interface between system inputs and physical outputs, can be easily modied at the
user level. Efforts directed at protecting against rmware modi cation are hindered by the
lack of foundational research about attack development and implementation. This paper
examines the vulnerability of PLCs to intentional rmware modications in order to obtain
a better understanding of the threats posed by PLC rmware modication attacks and the
feasibility of these attacks. A general rmware analysis methodology is presented, and
a proof-of-concept experiment is used to demonstrate how legitimate rmware can be
updated and uploaded to an Allen-Bradley ControlLogix L61 PLC.
Published by Elsevier B.V.
1. Introduction
Modern industrial applications employ advanced automation
and management networks that are collectively referred to as
industrial control systems. These systems are responsible for
the precise and consistent operation of critical infrastructure
assets. The reliance of industrial control systems on modern
information technology solutions, including IP-based network-
ing and embedded computing, has raised serious security
concerns [19]. The inexorable amalgamation of technologies
from two traditionally distinct cultures has created a schism
with regard to the security capabilities of information technol-
ogy and industrial control systems. Indeed, industrial control
system security is well behind information technology system
security in terms of the sophistication and scale of security
policies, techniques and tools.
Meanwhile, cyber attacks on industrial control systems
are increasing in intensity [20]. Examples such as Stuxnet
provide insight into future cyber threats on industrial control
systems [7]. Like traditional attacks on information technol-
ogy systems, attacks on industrial control systems are target-
ing lower-level control to allow for more powerful and exible
system manipulation. The allure of industrial control system
attacks and the ultimate goal of malicious manipulation is
the ability to elicit physical manifestations through cyber
means. As the nal link between cyber and physical compo-
nents of industrial control systems, programmable logic
controllers (PLCs) are critical to the operation of critical
infrastructure assets. PLCs are embedded devices that are
programmed to manage and control physical components
based on system inputs and requirements. The lowest pro-
gramming abstraction layer of a PLC is the rmware. Mal-
icious modication or counterfeiting of PLC rmware can
provide an adversary with complete control over an indus-
trial control device and any physical system components that
come under its purview.
This paper examines the feasibility of rmwa re modication
attacks on PLCs. Specically, it investigates and assesses the
1874-5482/$ - see front matter Published by Elsevier B.V.
http://dx.doi.org/10.1016/j.ijcip.2013.04.004
n
Corresponding author.
E-mail address: jonathan.butts@at.edu (J. Butts).
international journal of critical infrastructure protection 6 (2013) 76–84
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭