2017
DOI: 10.1007/978-3-319-71368-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation

Abstract: Abstract. Input/Output is the mechanism through which Programmable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper with the integrity and availability of PLCs I/O by explo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…This reflects both the large number of "low-hanging fruit" vulnerabilities, and an increased interest from attackers towards the disruption of industrial processes. To date, research efforts have predominately focused on real-time operating systems, firmware vulnerabilities, industrial protocols, and bypassing traditional security controls ( Abbasi et al, 2016 ;Biham et al, 2019 ;Drias et al, 2015 ;Nochvay, 2019 ;Wardak et al, 2016 ).…”
Section: Related Workmentioning
confidence: 99%
“…This reflects both the large number of "low-hanging fruit" vulnerabilities, and an increased interest from attackers towards the disruption of industrial processes. To date, research efforts have predominately focused on real-time operating systems, firmware vulnerabilities, industrial protocols, and bypassing traditional security controls ( Abbasi et al, 2016 ;Biham et al, 2019 ;Drias et al, 2015 ;Nochvay, 2019 ;Wardak et al, 2016 ).…”
Section: Related Workmentioning
confidence: 99%
“…This reflects both the large number of "low-hanging fruit" vulnerabilities, and an increased interest from attackers towards the disruption of industrial processes. To date, research efforts have predominately focused on real-time operating systems, firmware vulnerabilities, industrial protocols, and bypassing traditional security controls [3,6,17,41,53].…”
Section: Related Workmentioning
confidence: 99%
“…Industrial control systems are often controlled by programmable logic controllers due to their modular input/output (I/O) options and ability to operate in harsh environments. Programmable logic controllers typically have minimalized operating systems and often no security software, which render them vulnerable to cyber attacks, such as the Stuxnet computer worm or via the manipulation of controller I/O pins as described in [1]. Potential ways to influence I/O pin values are via configuration manipulation attacks, control-flow attacks and code manipulation attacks.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Potential ways to influence I/O pin values are via configuration manipulation attacks, control-flow attacks and code manipulation attacks. The manipulation of I/O pins, called a pin control attack [1], involves reconfiguring pin assignments so that output pins are changed to input pins, and vice versa.…”
Section: Background and Literature Reviewmentioning
confidence: 99%