Runtime Enforcement for Control System Security

被引:8
|
作者
Lanotte, Ruggero [1 ]
Merro, Massimo [2 ]
Munteanu, Andrei [2 ]
机构
[1] Univ Insubria, Como, Italy
[2] Univ Verona, Verona, Italy
关键词
Runtime enforcement; process calculus; control system security; PLC malware;
D O I
10.1109/CSF49147.2020.00025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosion of Industry 4.0, industrial facilities and critical infrastructures are transforming into "smart" systems that dynamically adapt to external events. The result is an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, which are more and more exposed to cyber-physical attacks, i.e., security breaches in cyberspace that adversely affect the physical processes at the core of industrial control systems. We apply runtime enforcement techniques, based on an ad-hoc sub-class of Ligatti et al.'s edit automata, to enforce specification compliance in networks of potentially compromised controllers, formalised in Hennessy and Regan's Timed Process Language. We define a synthesis algorithm that, given an alphabet P of observable actions and an enforceable regular expression e capturing a timed property for controllers, returns a monitor that enforces the property e during the execution of any (potentially corrupted) controller with alphabet P and complying with the property e. Our monitors correct and suppress incorrect actions coming from corrupted controllers and emit actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical properties, such as transparency and soundness, the proposed enforcement ensures non-obvious properties, such as polynomial complexity of the synthesis, deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers.
引用
收藏
页码:246 / 261
页数:16
相关论文
共 50 条
  • [1] Industrial Control Systems Security via Runtime Enforcement
    Lanotte, Ruggero
    Merro, Massimo
    Munteanu, Andrei
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (01)
  • [2] Specification and runtime enforcement of security policies
    Jin, Ying
    Zhang, Jing
    Zheng, Xiaojuan
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
  • [3] Static enforcement of security in runtime systems
    Pedersen, Mathias, V
    Askarov, Aslan
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 335 - 350
  • [4] Runtime Enforcement of Dynamic Security Policies
    Horcas, Jose-Miguel
    Pinto, Monica
    Fuentes, Lidia
    SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 340 - 356
  • [5] Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF
    Gwak, Songi
    Doan, Thien-Phuc
    Jung, Souhwan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 1773 - 1786
  • [6] Runtime Enforcement with Partial Control
    Khoury, Raphael
    Halle, Sylvain
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 102 - 116
  • [7] A modular pipeline for enforcement of security properties at runtime
    Taleb, Rania
    Halle, Sylvain
    Khoury, Raphael
    ANNALS OF TELECOMMUNICATIONS, 2023, 78 (7-8) : 429 - 457
  • [8] An Android runtime security policy enforcement framework
    Hammad Banuri
    Masoom Alam
    Shahryar Khan
    Jawad Manzoor
    Bahar Ali
    Yasar Khan
    Mohsin Yaseen
    Mir Nauman Tahir
    Tamleek Ali
    Quratulain Alam
    Xinwen Zhang
    Personal and Ubiquitous Computing, 2012, 16 : 631 - 641
  • [9] A modular pipeline for enforcement of security properties at runtime
    Rania Taleb
    Sylvain Hallé
    Raphaël Khoury
    Annals of Telecommunications, 2023, 78 : 429 - 457
  • [10] An Android runtime security policy enforcement framework
    Banuri, Hammad
    Alam, Masoom
    Khan, Shahryar
    Manzoor, Jawad
    Ali, Bahar
    Khan, Yasar
    Yaseen, Mohsin
    Tahir, Mir Nauman
    Ali, Tamleek
    Alam, Quratulain
    Zhang, Xinwen
    PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) : 631 - 641