Live forensics of software attacks on cyber-physical systems

被引:28
|
作者
Al-Sharif, Ziad A. [1 ]
Al-Saleh, Mohammed, I [2 ]
Alawneh, Luay M. [1 ]
Jararweh, Yaser, I [2 ]
Gupta, Brij [3 ]
机构
[1] Jordan Univ Sci & Technol, Software Engn Dept, Irbid 22110, Jordan
[2] Jordan Univ Sci & Technol, Comp Sci Dept, Irbid 22110, Jordan
[3] Natl Inst Technol, Kurukshetra, Haryana, India
关键词
Digital forensics; Memory forensics; Program's execution behavior; Execution state; Execution path; Digital evidence; Evidence collection process; SECURITY; CHALLENGES; ARCHITECTURE; NETWORKS; SCIENCE;
D O I
10.1016/j.future.2018.07.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Increasingly, Cyber-physical Systems are expected to operate in different environments and interconnect with a diverse set of systems, equipment, and networks. This openness to heterogeneity, diversity, and complexity introduces a new level of vulnerabilities, which adds to the consistent need for security including the digital forensics capabilities. Digital investigators utilize the information on the attacker's computer to find clues that may help in proving a case. One aspect is the digital evidence that can be extracted from the main memory (RAM), which includes live information about running programs. A program's states, represented by variables' values, vary in their scope and duration. This paper explores RAM artifacts of Java programs. Because JVMs can run on various platforms, we compare the same program on three different implementations of JVM from forensic perspectives. Our investigation model assumes no information is provided by the underlying OS or JVM. Our results show that a program's states can still be extracted even after the garbage collector is explicitly invoked, the software is stopped, or the JVM is terminated. This research helps investigators identify the software used to launch the attack and understand its internal flows. Investigators can utilize this information to accuse the perpetrators and recover from attacks. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:1217 / 1229
页数:13
相关论文
共 50 条
  • [1] Cyber-Physical Systems Forensics: Today and Tomorrow
    Mohamed, Nader
    Al-Jaroodi, Jameela
    Jawhar, Imad
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2020, 9 (03)
  • [2] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    [J]. HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [3] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    [J]. 2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [4] Cryptanalytic attacks on cyber-physical systems
    Novotny, Martin
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 534 - 539
  • [5] Improved control of cyber-physical systems subject to cyber and physical attacks
    Mahmoud, Magdi S.
    Hamdan, Mutaz M.
    [J]. Cyber-Physical Systems, 2019, 5 (03) : 173 - 190
  • [6] A Survey of Network Attacks on Cyber-Physical Systems
    Cao, Liwei
    Jiang, Xiaoning
    Zhao, Yumei
    Wang, Shouguang
    You, Dan
    Xu, Xianli
    [J]. IEEE ACCESS, 2020, 8 : 44219 - 44227
  • [7] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [8] Cyber-physical attacks on power distribution systems
    Ayad, Abdelrahman
    Farag, Hany
    Youssef, Amr
    El-Saadany, Ehab
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (02) : 218 - 225
  • [9] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651
  • [10] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708