Abstract | ||
---|---|---|
Over the last decade, Programmable Logic Controllers (PLCs) have been increasingly targeted by attackers to obtain control over industrial processes that support critical services. Such targeted attacks typically require detailed knowledge of system-specific attributes, includ-ing hardware configurations, adopted protocols, and PLC control-logic, i.e., process compre-hension. The consensus from both academics and practitioners suggests stealthy process comprehension obtained from a PLC alone, to execute targeted attacks, is impractical. In contrast, we assert that current PLC programming practices open the door to a new vulner-ability class, affording attackers an increased level of process comprehension. To support this, we propose the concept of Process Comprehension at a Distance (PCaaD), as a novel methodological and automatable approach towards the system-agnostic identification of PLC library functions. This leads to the targeted exfiltration of operational data, manipula-tion of control-logic behavior, and establishment of covert command and control channels through unused memory. We validate PCaaD on widely used PLCs through its practical ap-plication. (c) 2021 Elsevier Ltd. All rights reserved. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1016/j.cose.2021.102424 | COMPUTERS & SECURITY |
Keywords | DocType | Volume |
PLC Programming Practices, Reconnaissance, Process Comprehension, C2, ICS, SCADA, OT | Journal | 110 |
ISSN | Citations | PageRank |
0167-4048 | 1 | 0.36 |
References | Authors | |
0 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Benjamin Green | 1 | 18 | 5.01 |
Richard Derbyshire | 2 | 1 | 0.36 |
Marina Krotofil | 3 | 16 | 2.59 |
William Knowles | 4 | 65 | 7.21 |
Daniel Prince | 5 | 50 | 5.90 |
Neeraj Suri | 6 | 10 | 4.94 |