Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security 2020
DOI: 10.1145/3369412.3395068
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…We point out that a more fine-grained classification scheme has been proposed, especially to uniform discrepancies between different research works dealing with network steganography and covert channels, even not limited to the network-wide case [11], [24]. Unfortunately, information hiding techniques are proliferating in almost every new protocol or network/computing framework [17], [18], IoT environment [19], [25], smart vehicle [26], or industrial control system [27], [28], just to mention the most popular or emerging scenarios. Concerning recent examples, [20] analyzes many opportunities that an attacker can exploit for creating a covert channel within the Network Time Protocol, whereas [13] investigates whether timing channels can be used to implement long-range communications across different continents.…”
Section: A Network Covert Channelsmentioning
confidence: 99%
“…We point out that a more fine-grained classification scheme has been proposed, especially to uniform discrepancies between different research works dealing with network steganography and covert channels, even not limited to the network-wide case [11], [24]. Unfortunately, information hiding techniques are proliferating in almost every new protocol or network/computing framework [17], [18], IoT environment [19], [25], smart vehicle [26], or industrial control system [27], [28], just to mention the most popular or emerging scenarios. Concerning recent examples, [20] analyzes many opportunities that an attacker can exploit for creating a covert channel within the Network Time Protocol, whereas [13] investigates whether timing channels can be used to implement long-range communications across different continents.…”
Section: A Network Covert Channelsmentioning
confidence: 99%
“…In addition, Hildebrandt et al demonstrated that a command injection attack through a hidden channel could be performed on a packet transmitted from a server to a client (PLC) in an OPC UA protocol-based communication environment, a potential supply chain attack. Attack vectors have also been described [13]. For example, Polge et al identified new threats that can occur using the OPC UA protocol based on IoT security threat modeling [14].…”
Section: Opc Ua Security Analysismentioning
confidence: 99%
“…Moreover, studies have demonstrated denial-of-service (DoS) attacks, packet sniffing, and man-in-the-middle (MiTM) attacks through attack simulations on OPC UA networks [8][9][10][11][12][13][14]. However, they focused on the impact assessment of industrial Internet of Things (IoT) systems and verified possible attack types for known security threats specified in the OPC UA system specifications.…”
Section: Introduction 1background and Motivationmentioning
confidence: 99%
“…Most recently, covert channels in the Internet of Things has gained increasing attention, cf. works by Mileva et al [28], Wendzel et al [29] and Hildebrandt et al [30].…”
Section: Related Workmentioning
confidence: 99%