{"title":"根除信任:从西门子S7-1500 plc中不可修补的硬件信任根漏洞的教训","authors":"Yuanzhe Wu, Grant Skipper, Ang Cui","doi":"10.1109/HOST55118.2023.10133438","DOIUrl":null,"url":null,"abstract":"Over the past decade, low-cost hardware crypto-coprocessors have become an attractive solution for improving device security on embedded systems. Relying on dedicated components to offload security operations, however, presents unique challenges to overall system security. When implemented incorrectly, these components may be abused by adversaries to infiltrate Root-of-Trust (RoT) protections and compromise the greater system. Unlike software-based RoT, when a hardware-based RoT is found vulnerable to tampers there are few remedies to ‘patch’ or defend against attacks. This work presents a case study for addressing realworld security practices related to implementing hardware RoT for embedded systems via discrete co-processing components. Furthermore, we identify design fallacies, which we have encountered with increasing frequency in commercial embedded systems. Through this investigation, we provide practical mitigating solutions for integrating secure RoT peripherals for use on embedded hardware. Specifically, this assessment is conducted by uncovering novel vulnerabilities related to the discrete RoT implementation on the Siemens S7-1500 series Programmable Logic Controllers (PLCs). Our findings are cautionary evidence of how tlawed assumptions related to RoT implementation may allow malicious actors to spoof authentication credentials, re-encrypt firmware, and ultimately gain covert, privileged control over these devices without invasive or destructive practices.","PeriodicalId":128125,"journal":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs\",\"authors\":\"Yuanzhe Wu, Grant Skipper, Ang Cui\",\"doi\":\"10.1109/HOST55118.2023.10133438\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past decade, low-cost hardware crypto-coprocessors have become an attractive solution for improving device security on embedded systems. Relying on dedicated components to offload security operations, however, presents unique challenges to overall system security. When implemented incorrectly, these components may be abused by adversaries to infiltrate Root-of-Trust (RoT) protections and compromise the greater system. Unlike software-based RoT, when a hardware-based RoT is found vulnerable to tampers there are few remedies to ‘patch’ or defend against attacks. This work presents a case study for addressing realworld security practices related to implementing hardware RoT for embedded systems via discrete co-processing components. Furthermore, we identify design fallacies, which we have encountered with increasing frequency in commercial embedded systems. Through this investigation, we provide practical mitigating solutions for integrating secure RoT peripherals for use on embedded hardware. Specifically, this assessment is conducted by uncovering novel vulnerabilities related to the discrete RoT implementation on the Siemens S7-1500 series Programmable Logic Controllers (PLCs). Our findings are cautionary evidence of how tlawed assumptions related to RoT implementation may allow malicious actors to spoof authentication credentials, re-encrypt firmware, and ultimately gain covert, privileged control over these devices without invasive or destructive practices.\",\"PeriodicalId\":128125,\"journal\":{\"name\":\"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HOST55118.2023.10133438\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HOST55118.2023.10133438","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Uprooting Trust: Learnings from an Unpatchable Hardware Root-of-Trust Vulnerability in Siemens S7-1500 PLCs
Over the past decade, low-cost hardware crypto-coprocessors have become an attractive solution for improving device security on embedded systems. Relying on dedicated components to offload security operations, however, presents unique challenges to overall system security. When implemented incorrectly, these components may be abused by adversaries to infiltrate Root-of-Trust (RoT) protections and compromise the greater system. Unlike software-based RoT, when a hardware-based RoT is found vulnerable to tampers there are few remedies to ‘patch’ or defend against attacks. This work presents a case study for addressing realworld security practices related to implementing hardware RoT for embedded systems via discrete co-processing components. Furthermore, we identify design fallacies, which we have encountered with increasing frequency in commercial embedded systems. Through this investigation, we provide practical mitigating solutions for integrating secure RoT peripherals for use on embedded hardware. Specifically, this assessment is conducted by uncovering novel vulnerabilities related to the discrete RoT implementation on the Siemens S7-1500 series Programmable Logic Controllers (PLCs). Our findings are cautionary evidence of how tlawed assumptions related to RoT implementation may allow malicious actors to spoof authentication credentials, re-encrypt firmware, and ultimately gain covert, privileged control over these devices without invasive or destructive practices.