Data space randomization for securing cyber-physical systems

被引:1
|
作者
Potteiger, Bradley [1 ]
Cai, Feiyang [2 ]
Zhang, Zhenkai [3 ]
Koutsoukos, Xenofon [2 ]
机构
[1] Johns Hopkins Appl Phys Lab, Laurel, MD 20723 USA
[2] Vanderbilt Univ, Inst Software Integrated Syst, 221 Kirkland Hall, Nashville, TN 37235 USA
[3] Clemson Univ, Dept Comp Sci, Clemson, SC USA
基金
美国国家科学基金会;
关键词
Moving target defenses; Data space randomization; Cyber-physical systems; Autonomous vehicles; Resiliency;
D O I
10.1007/s10207-021-00568-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-control data attacks have become widely popular for circumventing authentication mechanisms in websites, servers, and personal computers. These attacks can be executed against cyber-physical systems (CPSs) in which not only authentication is an issue, but safety is at risk. Furthermore, any unauthorized change to safety-critical variables within the software may cause damage or even catastrophic consequences. Moving target defense techniques such as data space randomization (DSR) have become popular for protecting against memory corruption attacks such as non-control data attacks. However, current DSR implementations rely on source code transformations and do not stop critical variables from being overwritten, only that the new overwritten value will be vastly different than expected by the attacker. As such, these implementations are often ineffective for legacy CPS software in which only a binary is available. The problem addressed in this paper is how do we protect against non-control data attacks in legacy CPS software while ensuring that we can detect instances of variable integrity violations. We solve this problem by combining DSR at the binary level with variable comparison checks to ensure that we can detect and mitigate any attacker attempt to overwrite safety-critical variables. Our security approach is demonstrated utilizing an autonomous emergency braking system case study.
引用
收藏
页码:597 / 610
页数:14
相关论文
共 50 条
  • [1] Data space randomization for securing cyber-physical systems
    Bradley Potteiger
    Feiyang Cai
    Zhenkai Zhang
    Xenofon Koutsoukos
    [J]. International Journal of Information Security, 2022, 21 : 597 - 610
  • [2] Securing the Hardware of Cyber-Physical Systems
    Regazzoni, Francesco
    Polian, Ilia
    [J]. 2017 22ND ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2017, : 194 - 199
  • [3] Design Methodologies for Securing Cyber-Physical Systems
    Al Faruque, Mohammad
    Regazzoni, Francesco
    Pajic, Miroslav
    [J]. 2015 INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS (CODES+ISSS), 2015, : 30 - 36
  • [4] Securing Cyber-Physical Systems with Adaptive Commensurate Response
    Zheng, Zhiyuan
    Jin, Shan
    Bettati, Riccardo
    Reddy, A. L. Narasimha
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 155 - 163
  • [5] A new inexpensive approach for securing cyber-physical systems
    Kanafi, Faraz Safarpour
    Arnarson, Halldor
    Bremdal, Bernt Arild
    [J]. 2022 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII 2022), 2022, : 790 - 796
  • [6] When Cyber Got Real: Challenges In Securing Cyber-Physical Systems
    Zanero, Stefano
    [J]. 2018 IEEE SENSORS, 2018, : 1370 - 1373
  • [7] Securing Cyber-Physical Systems through Digital Twins
    Eckhart, Matthias
    Ekelhart, Andreas
    [J]. ERCIM NEWS, 2018, (115): : 22 - 23
  • [8] A Moving Target Defense for Securing Cyber-Physical Systems
    Griffioen, Paul
    Weerakkody, Sean
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2016 - 2031
  • [9] Cyber-Physical Challenges for Space Systems
    Klesh, Andrew T.
    Cutler, James W.
    Atkins, Ella M.
    [J]. 2012 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2012), 2012, : 45 - 52
  • [10] Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
    Miao, Fei
    Zhu, Quanyan
    Pajic, Miroslav
    Pappas, George J.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 106 - 117