ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs

被引:0
|
作者
Rajput, Prashant Hari Narayan [1 ]
Doumanidis, Constantine [2 ]
Maniatakos, Michail [2 ]
机构
[1] NYU Tandon Sch Engn, Brooklyn, NY 11201 USA
[2] New York Univ Abu Dhabi, Abu Dhabi, U Arab Emirates
关键词
FORMAL VERIFICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paradigm shift of enabling extensive intercommunication between the Operational Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the IT world to propagate to the OT side. Therefore, the security layer offered in the past by air gapping is removed, making security patching for OT devices a hard requirement. Conventional patching involves a device reboot to load the patched code in the main memory, which does not apply to OT devices controlling critical processes due to downtime, necessitating in-memory vulnerability patching. Furthermore, these control binaries are often compiled by in-house proprietary compilers, further hindering the patching process and placing reliance on OT vendors for rapid vulnerability discovery and patch development. The current state-of-the-art hotpatching approaches only focus on firmware and/or RTOS. Therefore, in this work, we develop ICSPatch, a framework to automate control logic vulnerability localization using Data Dependence Graphs (DDGs). With the help of DDGs, ICSPatch pinpoints the vulnerability in the control application. As an independent second step, ICSPatch can non-intrusively hotpatch vulnerabilities in the control application directly in the main memory of Programmable Logic Controllers while maintaining reliable continuous operation. To evaluate our framework, we test ICSPatch on a synthetic dataset of 24 vulnerable control application binaries from diverse critical infrastructure sectors. Results show that ICSPatch could successfully localize all vulnerabilities and generate patches accordingly. Furthermore, the patch added negligible latency increase in the execution cycle while maintaining correctness and protection against the vulnerability.
引用
收藏
页码:6861 / 6876
页数:16
相关论文
共 3 条
  • [1] Towards Non-intrusive Malware Detection for Industrial Control Systems
    Rajput, Prashant Hari Narayan
    Maniatakos, Michail
    [J]. PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1703 - 1706
  • [2] A non-intrusive runtime enforcement on behaviors of open supervisory control and data acquisition systems
    Mao, Yan-Fang
    Zhang, Yang
    Chen, Jun-Liang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (08):
  • [3] A non-intrusive reduced order model using deep learning for realistic wind data generation for small unmanned aerial systems in urban spaces
    Vuppala, Rohit K. S. S.
    Kara, Kursat
    [J]. AIP ADVANCES, 2022, 12 (08)