USBCaptchaIn: Preventing (Un)Conventional Attacks from Promiscuously Used USB Devices in Industrial Control Systems

10/11/2018
by   Federico Griscioli, et al.
0

Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known to exploit USB thumb drives as an effective spreading vector. In ICSes, thumb drives are widely used to transfer files among disconnected systems and represent a serious security risks, since, they may be promiscuously used in both critical and regular systems. The threats come both from malware hidden in files stored in the thumb drives and from BadUSB attacks [16]. BadUSB leverages the modification of firmware of USB devices in order to mimic the behaviour of a keyboard and send malicious commands to the host. We present a solution that allows a promiscuous use of USB thumbs drives while protecting critical machines from malware, that spread by regular file infection or by firmware infection. The main component of the architecture we propose is an hardware, called USBCaptchaIn, intended to be in the middle between a critical machine and all USB devices. We do not require users to change the way they use thumb drives. To avoid human-errors, we do not require users to take any decision. The proposed approach is highly compatible with already deployed products of a ICS environment and proactively blocks malware before they reach their targets. We describe our solution, provide a thorough analysis of the security of our approach in the ICS context, and report the informal feedback of some experts regarding our first prototypes.

READ FULL TEXT

page 9

page 23

research
11/02/2018

Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware

Malware still constitutes a major threat in the cybersecurity landscape,...
research
11/03/2020

Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands

On a regular basis, we read in the news about cyber-attacks on critical ...
research
02/11/2023

Sequential Embedding-based Attentive (SEA) classifier for malware classification

The tremendous growth in smart devices has uplifted several security thr...
research
07/27/2021

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

In the recent years, Portable Document Format, commonly known as PDF, ha...
research
10/24/2020

Safeguarding the IoT from Malware Epidemics: A Percolation Theory Approach

The upcoming Internet of things (IoT) is foreseen to encompass massive n...
research
05/13/2019

Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case

Comprehensive case studies on malicious code mostly focus on botnets and...
research
07/11/2019

Supply chain malware targets SGX: Take care of what you sign

Malware attacks represent a significant part of today's security threats...

Please sign up or login with your details

Forgot password? Click here to reset