TY - GEN
T1 - Towards Provable Security in Industrial Control Systems Via Dynamic Protocol Attestation
AU - Amorim, Arthur
AU - Kann, Trevor
AU - Taylor, Max
AU - Joneckis, Lance
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Industrial control systems (ICSs) increasingly rely on digital technlogies vulnerable to cyber attacks. Cyber attackers can infiltrate ICSs and execute malicious actions. Individually, each action seems innocuous. But taken together, they cause the system to enter an unsafe state. These attacks have resulted in dramatic consequences such as physical damage, economic loss, and environmental catastrophes. This paper introduces a methodology that restricts actions using protocols. These protocols only allow safe actions to execute. Protocols are written in a domain specific language we have embedded in an interactive theorem prover (ITP). The ITP enables formal, machine-checked proofs to ensure protocols maintain safety properties. We use dynamic attestation to ensure ICSs conform to their protocol even if an adversary compromises a component. Since protocol conformance prevents unsafe actions, the previously mentioned cyber attacks become impossible. We demonstrate the effectiveness of our methodology using an example from the Fischertechnik Industry 4.0 platform. We measure dynamic attestation's impact on latency and throughput. Our approach is a starting point for studying how to combine formal methods and protocol design to thwart attacks intended to cripple ICSs.
AB - Industrial control systems (ICSs) increasingly rely on digital technlogies vulnerable to cyber attacks. Cyber attackers can infiltrate ICSs and execute malicious actions. Individually, each action seems innocuous. But taken together, they cause the system to enter an unsafe state. These attacks have resulted in dramatic consequences such as physical damage, economic loss, and environmental catastrophes. This paper introduces a methodology that restricts actions using protocols. These protocols only allow safe actions to execute. Protocols are written in a domain specific language we have embedded in an interactive theorem prover (ITP). The ITP enables formal, machine-checked proofs to ensure protocols maintain safety properties. We use dynamic attestation to ensure ICSs conform to their protocol even if an adversary compromises a component. Since protocol conformance prevents unsafe actions, the previously mentioned cyber attacks become impossible. We demonstrate the effectiveness of our methodology using an example from the Fischertechnik Industry 4.0 platform. We measure dynamic attestation's impact on latency and throughput. Our approach is a starting point for studying how to combine formal methods and protocol design to thwart attacks intended to cripple ICSs.
KW - Correctness proofs
KW - Formal methods
KW - Industrial automation
KW - Industrial control
KW - Software and System Safety
UR - https://www.scopus.com/pages/publications/105001670699
U2 - 10.1109/ACSACW65225.2024.00020
DO - 10.1109/ACSACW65225.2024.00020
M3 - Conference contribution
AN - SCOPUS:105001670699
T3 - Proceeding - 2024 Annual Computer Security Applications Conference Workshops, ACSACW 2024
SP - 120
EP - 132
BT - Proceeding - 2024 Annual Computer Security Applications Conference Workshops, ACSACW 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 40th Annual Computer Security Applications Conference Workshops, ACSACW 2024
Y2 - 9 December 2024 through 13 December 2024
ER -