Practical Pitfalls for Security in OPC UA

04/13/2021
by   Alessandro Erba, et al.
0

In 2006, the OPC Foundation released the first specification for OPC Unified Architecture protocol, one of the industrial protocols that promises security features such as authentication, authorization, integrity, and confidentiality. Challenges in the practical adoption of those security features by product vendors, libraries implementing the standard, and end-users were not investigated so far. In this work, we systematically investigate practical challenges to configure OPC UA securely. In particular, we review 48 artifacts consisting of products and libraries for OPC UA and show that 38 out of the 48 artifacts have one (or more) security issue. In particular, we show that 7 OPC UA artifacts do not support the security features of the protocol at all. In addition, 31 artifacts that partially feature OPC UA security rely on incomplete libraries and come with misleading instructions. Consequently, relying on those products and libraries will result in vulnerable implementations of OPC UA security features. We design, implement and demonstrate attacks in which the attacker can steal credentials exchanged between victims, eavesdrop on process information, manipulate the physical process through sensor values and actuator commands, and prevent the detection of anomalies in the physical process.

READ FULL TEXT
research
02/18/2021

Security audit logging in microservice-based systems: survey of architecture patterns

Objective. Service-oriented architecture increases technical abilities f...
research
03/13/2019

The Emergence of Software Diversity in Maven Central

Maven artifacts are immutable: an artifact that is uploaded on Maven Cen...
research
09/07/2023

Security assessment of common open source MQTT brokers and clients

Security and dependability of devices are paramount for the IoT ecosyste...
research
06/24/2018

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring

We present WPSE, a browser-side security monitor for web protocols desig...
research
03/25/2021

The Cost of OSCORE and EDHOC for Constrained Devices

Many modern IoT applications rely on the Constrained Application Protoco...
research
12/01/2019

On the Security of A Remote Cloud Storage Integrity Checking Protocol

Data security and privacy is an important but challenging problem in clo...
research
12/13/2019

Implementing a Protocol Native Managed Cryptocurrency

Previous work presented a theoretical model based on the implicit Bitcoi...

Please sign up or login with your details

Forgot password? Click here to reset