Hojin Choi, Hyuk Kwon, Junghee Lee, Yonghee Lee, Kijoong Kim
{"title":"Hardware-Based Isolation Technique to Guarantee Availability of Security Controls in a Gateway for Industrial Networks","authors":"Hojin Choi, Hyuk Kwon, Junghee Lee, Yonghee Lee, Kijoong Kim","doi":"10.1109/ICEIC57457.2023.10049871","DOIUrl":null,"url":null,"abstract":"Protocols such as DNP and Modbus are widely used in many industrial networks, and security controls are often employed in a protocol gateway placed in-between public and trusted networks. In this paper, an architecture is proposed to protect the security controls running in a hardware-isolated space by providing an isolation environment to the protocol stack and security controls via TrustZone, even if the protocol stack is compromised. In addition, we evaluate whether our proposed architecture can protect against attack scenarios such as manipulation commands, information leakage, and fuzzing attacks, and we compare the performance of the gateway with and without TrustZone.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIC57457.2023.10049871","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Protocols such as DNP and Modbus are widely used in many industrial networks, and security controls are often employed in a protocol gateway placed in-between public and trusted networks. In this paper, an architecture is proposed to protect the security controls running in a hardware-isolated space by providing an isolation environment to the protocol stack and security controls via TrustZone, even if the protocol stack is compromised. In addition, we evaluate whether our proposed architecture can protect against attack scenarios such as manipulation commands, information leakage, and fuzzing attacks, and we compare the performance of the gateway with and without TrustZone.