BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems

10/07/2022
by   Anomadarshi Barua, et al.
0

Over the last six years, several papers used memory deduplication to trigger various security issues, such as leaking heap-address and causing bit-flip in the physical memory. The most essential requirement for successful memory deduplication is to provide identical copies of a physical page. Recent works use a brute-force approach to create identical copies of a physical page that is an inaccurate and time-consuming primitive from the attacker's perspective. Our work begins to fill this gap by providing a domain-specific structured way to duplicate a physical page in cloud settings in the context of industrial control systems (ICSs). Here, we show a new attack primitive - BayesImposter, which points out that the attacker can duplicate the .bss section of the target control DLL file of cloud protocols using the Bayesian estimation technique. Our approach results in less memory (i.e., 4 KB compared to GB) and time (i.e., 13 minutes compared to hours) compared to the brute-force approach used in recent works. We point out that ICSs can be expressed as state-space models; hence, the Bayesian estimation is an ideal choice to be combined with memory deduplication for a successful attack in cloud settings. To demonstrate the strength of BayesImposter, we create a real-world automation platform using a scaled-down automated high-bay warehouse and industrial-grade SIMATIC S7-1500 PLC from Siemens as a target ICS. We demonstrate that BayesImposter can predictively inject false commands into the PLC that can cause possible equipment damage with machine failure in the target ICS. Moreover, we show that BayesImposter is capable of adversarial control over the target ICS resulting in severe consequences, such as killing a person but making it looks like an accident. Therefore, we also provide countermeasures to prevent the attack.

READ FULL TEXT

page 3

page 8

page 9

research
03/15/2022

Towards Adversarial Control Loops in Sensor Attacks: A Case Study to Control the Kinematics and Actuation of Embedded Systems

Recent works investigated attacks on sensors by influencing analog senso...
research
02/10/2020

Cybersecurity for Industrial Control Systems: A Survey

Industrial Control System (ICS) is a general term that includes supervis...
research
12/03/2019

An Off-Chip Attack on Hardware Enclaves via the Memory Bus

This paper shows how an attacker can break the confidentiality of a hard...
research
05/24/2019

Devil in the Detail: Attack Scenarios in Industrial Applications

In the past years, industrial networks have become increasingly intercon...
research
11/30/2019

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

Cybersecurity of industrial control system is a very complex and challen...
research
06/15/2021

Grounds for Suspicion: Physics-based Early Warnings for Stealthy Attacks on Industrial Control Systems

Stealthy attacks on Industrial Control Systems can cause significant dam...
research
02/16/2023

PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System

3GPP has introduced Private 5G to support the next-generation industrial...

Please sign up or login with your details

Forgot password? Click here to reset