A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers

Wael Alsabbagh, P. Langendörfer
{"title":"A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers","authors":"Wael Alsabbagh, P. Langendörfer","doi":"10.3390/automation3040030","DOIUrl":null,"url":null,"abstract":"Programmable logic controllers (PLCs) make up a substantial part of critical infrastructures (CIs) and industrial control systems (ICSs). They are programmed with a control logic that defines how to drive and operate critical processes such as nuclear power plants, petrochemical factories, water treatment systems, and other facilities. Unfortunately, these devices are not fully secure and are prone to malicious threats, especially those exploiting vulnerabilities in the control logic of PLCs. Such threats are known as control logic injection attacks. They mainly aim at sabotaging physical processes controlled by exposed PLCs, causing catastrophic damage to target systems as shown by Stuxnet. Looking back over the last decade, many research endeavors exploring and discussing these threats have been published. In this article, we present a flashback on the recent works related to control logic injection attacks against PLCs. To this end, we provide the security research community with a new systematization based on the attacker techniques under three main attack scenarios. For each study presented in this work, we overview the attack strategies, tools, security goals, infected devices, and underlying vulnerabilities. Based on our analysis, we highlight the current security challenges in protecting PLCs from such severe attacks and suggest security recommendations for future research directions.","PeriodicalId":90013,"journal":{"name":"Mediterranean Conference on Control & Automation : [proceedings]. IEEE Mediterranean Conference on Control & Automation","volume":"39 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mediterranean Conference on Control & Automation : [proceedings]. IEEE Mediterranean Conference on Control & Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/automation3040030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Programmable logic controllers (PLCs) make up a substantial part of critical infrastructures (CIs) and industrial control systems (ICSs). They are programmed with a control logic that defines how to drive and operate critical processes such as nuclear power plants, petrochemical factories, water treatment systems, and other facilities. Unfortunately, these devices are not fully secure and are prone to malicious threats, especially those exploiting vulnerabilities in the control logic of PLCs. Such threats are known as control logic injection attacks. They mainly aim at sabotaging physical processes controlled by exposed PLCs, causing catastrophic damage to target systems as shown by Stuxnet. Looking back over the last decade, many research endeavors exploring and discussing these threats have been published. In this article, we present a flashback on the recent works related to control logic injection attacks against PLCs. To this end, we provide the security research community with a new systematization based on the attacker techniques under three main attack scenarios. For each study presented in this work, we overview the attack strategies, tools, security goals, infected devices, and underlying vulnerabilities. Based on our analysis, we highlight the current security challenges in protecting PLCs from such severe attacks and suggest security recommendations for future research directions.
对可编程逻辑控制器的控制逻辑注入攻击的回顾
可编程逻辑控制器(plc)构成了关键基础设施(ci)和工业控制系统(ics)的重要组成部分。它们是用控制逻辑编程的,该逻辑定义了如何驱动和操作关键过程,如核电站、石化工厂、水处理系统和其他设施。不幸的是,这些设备并不完全安全,容易受到恶意威胁,特别是那些利用plc控制逻辑漏洞的威胁。这种威胁被称为控制逻辑注入攻击。它们主要旨在破坏由暴露的plc控制的物理过程,对目标系统造成灾难性破坏,如震网所示。回顾过去的十年,许多探索和讨论这些威胁的研究已经发表。在本文中,我们回顾了最近与针对plc的控制逻辑注入攻击相关的工作。为此,我们为安全研究界提供了一种基于三种主要攻击场景下攻击者技术的新系统。对于本工作中提出的每项研究,我们概述了攻击策略、工具、安全目标、受感染设备和潜在漏洞。根据我们的分析,我们强调了当前保护plc免受此类严重攻击的安全挑战,并为未来的研究方向提出了安全建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信