PCaaD: Towards Automated Determination and Exploitation of Industrial Processes

02/19/2021
by   B. Green, et al.
0

Over the last decade, Programmable Logic Controllers (PLCs) have been increasingly targeted by attackers to obtain control over industrial processes that support critical services. Such targeted attacks typically require detailed knowledge of system-specific attributes, including hardware configurations, adopted protocols, and PLC control-logic, i.e. process comprehension. The consensus from both academics and practitioners suggests stealthy process comprehension obtained from a PLC alone, to conduct targeted attacks, is impractical. In contrast, we assert that current PLC programming practices open the door to a new vulnerability class based on control-logic constructs. To support this, we propose the concept of Process Comprehension at a Distance (PCaaD), as a novel methodological and automatable approach for system-agnostic exploitation of PLC library functions, leading to the targeted exfiltration of operational data, manipulation of control-logic behavior, and establishment of covert command and control channels through unused memory. We validate PCaaD on widely used PLCs, by identification of practical attacks.

READ FULL TEXT

page 8

page 10

research
03/30/2022

PLCverif: Status of a Formal Verification Tool for Programmable Logic Controller

Programmable Logic Controllers (PLC) are widely used for industrial auto...
research
10/17/2019

PropFuzz – An IT-Security Fuzzing Framework for Proprietary ICS Protocols

Programmable Logic Controllers are used for smart homes, in production p...
research
11/14/2019

Detecting Safety and Security Faults in PLC Systems with Data Provenance

Programmable Logic Controllers are an integral component for managing ma...
research
05/21/2019

Two Decades of SCADA Exploitation: A Brief History

Since the early 1960, industrial process control has been applied by ele...
research
06/09/2020

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses

Control logic programs play a critical role in industrial control system...
research
03/17/2021

An ELEGANT dataset with Denial of Service and Man in The Middle attacks

This document describes a dataset with diverse types of Denial of Servic...

Please sign up or login with your details

Forgot password? Click here to reset