{"title":"Enhancing Boofuzz Process Monitoring for Closed-Source SCADA System Fuzzing","authors":"Patrick Cousineau, Brian Lachine","doi":"10.1109/SysCon53073.2023.10131048","DOIUrl":null,"url":null,"abstract":"Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Systems Conference (SysCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SysCon53073.2023.10131048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.