Formal Security Assessment of Modbus Protocol

被引:0
|
作者
Nardone, Roberto [1 ]
Rodriguez, Ricardo J. [2 ,3 ]
Marrone, Stefano [3 ]
机构
[1] Univ Napoli Federico II, DIETI, Naples, Italy
[2] Univ Zaragoza, DIIS, Zaragoza, Spain
[3] Seconda Univ Napoli, Dipartimento Matemat & Fis, Caserta, Italy
关键词
SCADA control systems; Dynamic State Machines; Model checking; Cyber-Physical Security; Modbus;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed, unroutable networks, making them an easy target for cybercriminals. In this regard, Modbus is a widely adopted protocol in control systems. Modbus protocol, however, lacks for security properties and is vulnerable to plenty of attacks (as spoofing, flooding, or replay, to name a few). In this paper, we propose a formal modeling of Modbus protocol using an extension of hierarchical state-machines that is automatically transformed to a Promela model. This model allows us to find counterexamples of security properties by model-checking. In particular, the original contribution of this paper is the formal demonstration of the existence of man-in-the-middle attacks in Modbus-based systems. Our approach also allows to formally evaluate security properties in future extensions of Modbus protocols.
引用
收藏
页码:142 / 147
页数:6
相关论文
共 50 条
  • [1] Formal modeling and analysis of the Modbus protocol
    Dutertre, Bruno
    IFIP Advances in Information and Communication Technology, 2008, 253 : 189 - 204
  • [2] Formal modeling and analysis of the Modbus protocol
    Dutertre, Bruno
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 189 - 204
  • [3] Formal Verification and Security Assessment of the Drone Remote Identification Protocol
    Khan, Suleman
    Gaba, Gurjot Singh
    Boeira, Felipe
    Gurtov, Andrei
    2024 2ND INTERNATIONAL CONFERENCE ON UNMANNED VEHICLE SYSTEMS-OMAN, UVS, 2024,
  • [4] Formal Reasoning for Security Protocol Correctness
    Adi, Kamel
    Pene, Liviu
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 63 - +
  • [5] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [6] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
  • [7] Formal Support to Security Protocol Development: A Survey
    Carlos Lopez Pimentel, Juan
    Monroy, Raul
    COMPUTACION Y SISTEMAS, 2008, 12 (01): : 89 - 108
  • [8] A Formal Security Analysis of the Signal Messaging Protocol
    Katriel Cohn-Gordon
    Cas Cremers
    Benjamin Dowling
    Luke Garratt
    Douglas Stebila
    Journal of Cryptology, 2020, 33 : 1914 - 1983
  • [9] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
  • [10] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123