TY - CHAP
T1 - Model Checking of Security Properties in Industrial Control Systems (ICS)
AU - Shrestha, Roshan
AU - Mehrpouyan, Hoda
AU - Xu, Dianxiang
N1 - Publisher Copyright:
© 2018 Copyright held by the owner/author(s).
PY - 2018/1/1
Y1 - 2018/1/1
N2 - With the increasing inter-connection of operation technology to the IT network, the security threat to the Industrial Control System (ICS) is increasing daily. Therefore, it is critical to utilize formal verification technique such as model checking to mathematically prove the correctness of security and safety requirements in the controller logic before it is deployed on the field. However, model checking requires considerable effort for regular ICS users and control technician to verify properties. This paper, provides a simpler approach to the model checking of temperature process control system by first starting with the control module design without formal verification. Second, identifying possible vulnerabilities in such design. Third, verifying the safety and security properties with a formal method.
AB - With the increasing inter-connection of operation technology to the IT network, the security threat to the Industrial Control System (ICS) is increasing daily. Therefore, it is critical to utilize formal verification technique such as model checking to mathematically prove the correctness of security and safety requirements in the controller logic before it is deployed on the field. However, model checking requires considerable effort for regular ICS users and control technician to verify properties. This paper, provides a simpler approach to the model checking of temperature process control system by first starting with the control module design without formal verification. Second, identifying possible vulnerabilities in such design. Third, verifying the safety and security properties with a formal method.
UR - https://scholarworks.boisestate.edu/cs_facpubs/163
UR - https://doi.org/10.1145/3176258.3176949
UR - http://www.scopus.com/inward/record.url?scp=85050256141&partnerID=8YFLogxK
U2 - 10.1145/3176258.3176949
DO - 10.1145/3176258.3176949
M3 - Chapter
T3 - 2018-January
SP - 164
EP - 166
BT - CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy
T2 - 8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018
Y2 - 19 March 2018 through 21 March 2018
ER -