Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulner- abilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating prob- lems posed by the incomparability of mitigation techniques. An experi- mental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

Combating memory corruption attacks on SCADA devices / C. Bellettini, J. Rrushi (IFIP INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING). - In: Critical Infrastructure Protection II / [a cura di] M. Papa, S. Shenoi. - [s.l] : Springer, 2008. - ISBN 9780387885223. - pp. 141-156 (( convegno International Conference on Critical Infrastructure Protection tenutosi a Arlington nel 2008 [10.1007/978-0-387-88523-0_11].

Combating memory corruption attacks on SCADA devices

C. Bellettini;J. Rrushi
2008

Abstract

Memory corruption attacks on SCADA devices can cause significant dis- ruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulner- abilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating prob- lems posed by the incomparability of mitigation techniques. An experi- mental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
No
English
SCADA systems; memory corruption attacks; Modbus protocol
Settore INF/01 - Informatica
Intervento a convegno
Esperti anonimi
Pubblicazione scientifica
Critical Infrastructure Protection II
M. Papa, S. Shenoi
Springer
2008
141
156
16
9780387885223
290
Volume a diffusione internazionale
International Conference on Critical Infrastructure Protection
Arlington
2008
IFIP
Convegno internazionale
Intervento inviato
Aderisco
C. Bellettini, J. Rrushi
Book Part (author)
reserved
273
Combating memory corruption attacks on SCADA devices / C. Bellettini, J. Rrushi (IFIP INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING). - In: Critical Infrastructure Protection II / [a cura di] M. Papa, S. Shenoi. - [s.l] : Springer, 2008. - ISBN 9780387885223. - pp. 141-156 (( convegno International Conference on Critical Infrastructure Protection tenutosi a Arlington nel 2008 [10.1007/978-0-387-88523-0_11].
info:eu-repo/semantics/bookPart
2
Prodotti della ricerca::03 - Contributo in volume
File in questo prodotto:
File Dimensione Formato  
Bellettini-Rrushi2008_Chapter_CombatingMemoryCorruptionAttac.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 515.87 kB
Formato Adobe PDF
515.87 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/225568
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 2
social impact