2021 IEEE European Symposium on Security and Privacy (EuroS&P) 2021
DOI: 10.1109/eurosp51992.2021.00033
|View full text |Cite
|
Sign up to set email alerts
|

Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 50 publications
0
3
0
Order By: Relevance
“…On the JTAG-based defense side, Rajput et al [33] present ORRIS, a lightweight and out-of-the-device framework that detects Linux-based PLC malware at both kernel and user-level by processing the information collected using the JTAG interface. Guri et al [34] propose JoKER, a JTAG-based framework for detecting rootkits in the Android OS kernel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the JTAG-based defense side, Rajput et al [33] present ORRIS, a lightweight and out-of-the-device framework that detects Linux-based PLC malware at both kernel and user-level by processing the information collected using the JTAG interface. Guri et al [34] propose JoKER, a JTAG-based framework for detecting rootkits in the Android OS kernel.…”
Section: Related Workmentioning
confidence: 99%
“…For any attacks that would leave traces in the memory [33], Aye establishes a trusted forensics chain to generate an authoritative result, as illustrated in Figure 3. The chain of forensics begins at the regular PLC's JTAG interface with an unattacked pristine state and ends with the JTAG adapter, which has full access to PLC memory.…”
Section: Establishment Of the Trusted Forensics Chainmentioning
confidence: 99%
“…Attacks on ICS have been explored in literature, for instance, attacking the Programmable Logic Controller (PLC) to change the control logic or its parameters process [19,25,17], modifying the firmware [11] or the sensors with false data injection (FDI) attacks that gather and relay data to the PLC [24,28,9,34] for attacking the controlled physical process. Proactively uncovering vulnerabilities in PLC programming [40] and detecting the presence of malware [35] are also topics of interest to the ICS community. Defenses for attacks on ICS hardware have also been studied extensively, among others these include protecting the PLC using control invariants (correlation between sensor readings and PLC commands) [44], extracting control logic rules [16] and detecting safety violations [26].…”
Section: Introductionmentioning
confidence: 99%