{"title":"Industrial Control Systems Security via Runtime Enforcement","authors":"Ruggero Lanotte, Massimo Merro, Andrei Munteanu","doi":"https://dl.acm.org/doi/10.1145/3546579","DOIUrl":null,"url":null,"abstract":"<p>With the advent of <i>Industry 4.0</i>, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as <i>programmable logic controllers</i>, increasingly interconnected and therefore exposed to <i>cyber-physical attacks</i>, i.e., security breaches in cyberspace that may adversely affect the physical processes underlying <i>industrial control systems</i>.</p><p>In this article, we propose a <i>formal approach</i> based on <i>runtime enforcement</i> to ensure specification compliance in networks of controllers, possibly compromised by <i>colluding malware</i> that may locally tamper with actuator commands, sensor readings, and inter-controller communications. Our approach relies on an ad-hoc sub-class of Ligatti et al.’s <i>edit automata</i> to enforce controllers represented in Hennessy and Regan’s <i>Timed Process Language</i>. We define a synthesis algorithm that, given an alphabet 𝒫 of observable actions and a timed correctness property <i>e</i>, returns a monitor that enforces the property <i>e</i> during the execution of any (potentially corrupted) controller with alphabet 𝒫, and complying with the property <i>e</i>. Our monitors do <i>mitigation</i> by correcting and suppressing incorrect actions of corrupted controllers and by generating actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical requirements, such as <i>transparency</i> and <i>soundness</i>, the proposed enforcement enjoys <i>deadlock- and diverge-freedom</i> of monitored controllers, together with <i>scalability</i> when dealing with networks of controllers. Finally, we test the proposed enforcement mechanism on a non-trivial case study, taken from the context of industrial water treatment systems, in which the controllers are injected with different malware with different malicious goals.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"23 1","pages":""},"PeriodicalIF":3.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Privacy and Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/https://dl.acm.org/doi/10.1145/3546579","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the advent of Industry 4.0, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, increasingly interconnected and therefore exposed to cyber-physical attacks, i.e., security breaches in cyberspace that may adversely affect the physical processes underlying industrial control systems.
In this article, we propose a formal approach based on runtime enforcement to ensure specification compliance in networks of controllers, possibly compromised by colluding malware that may locally tamper with actuator commands, sensor readings, and inter-controller communications. Our approach relies on an ad-hoc sub-class of Ligatti et al.’s edit automata to enforce controllers represented in Hennessy and Regan’s Timed Process Language. We define a synthesis algorithm that, given an alphabet 𝒫 of observable actions and a timed correctness property e, returns a monitor that enforces the property e during the execution of any (potentially corrupted) controller with alphabet 𝒫, and complying with the property e. Our monitors do mitigation by correcting and suppressing incorrect actions of corrupted controllers and by generating actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical requirements, such as transparency and soundness, the proposed enforcement enjoys deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers. Finally, we test the proposed enforcement mechanism on a non-trivial case study, taken from the context of industrial water treatment systems, in which the controllers are injected with different malware with different malicious goals.
期刊介绍:
ACM Transactions on Privacy and Security (TOPS) (formerly known as TISSEC) publishes high-quality research results in the fields of information and system security and privacy. Studies addressing all aspects of these fields are welcomed, ranging from technologies, to systems and applications, to the crafting of policies.