An experimental security analysis of an Industrial Robot Controller - - PowerPoint PPT Presentation

an experimental security analysis of an industrial robot
SMART_READER_LITE
LIVE PREVIEW

An experimental security analysis of an Industrial Robot Controller - - PowerPoint PPT Presentation

An experimental security analysis of an Industrial Robot Controller Davide Quarta , Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero San Jos (CA), May 22 nd , 2017 38th IEEE Symposium on Security and


slide-1
SLIDE 1

An experimental security analysis

  • f an Industrial Robot Controller

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero San José (CA), May 22nd, 2017 38th IEEE Symposium on Security and Privacy

slide-2
SLIDE 2
slide-3
SLIDE 3

Motivation: Industry 4.0 Trends

Interconnected Flexibly programmable Remotely exposed

slide-4
SLIDE 4

Motivation: Lack of Awareness

Survey: Robot users vs. system security 50 domain experts—users interviewed: 20 answers

➢ 28%* access control policies not enforced ➢ 30% robots accessible over Internet ➢ 76% never performed a pentest ➢ > 50% not a realistic threat

* some users did not answer all the questions

slide-5
SLIDE 5

How do we define a robot-specific attack?

slide-6
SLIDE 6

Requirements: Laws of Robotics

➢ I/O Accuracy ■ Read precise values ■ Issue correct/accurate commands ➢ Safety ■ Never harm humans ■ Correctly inform operator ➢ Integrity ■ No damage to the robot

slide-7
SLIDE 7

Requirements: Laws of Robotics

➢ I/O Accuracy ■ Read precise values ■ Issue correct/accurate commands ➢ Safety ■ Never harm humans ■ Correctly inform operator ➢ Integrity ■ No damage to the robot

slide-8
SLIDE 8

Requirements: Laws of Robotics

➢ I/O Accuracy ■ Read precise values ■ Issue correct/accurate commands ➢ Safety ■ Never harm humans ■ Correctly inform operator ➢ Integrity ■ No damage to the robot

slide-9
SLIDE 9

Requirements: Laws of Robotics

➢ I/O Accuracy ■ Read precise values ■ Issue correct/accurate commands ➢ Safety ■ Never harm humans ■ Correctly inform operator ➢ Integrity ■ No damage to the robot Robot-specific Attack: Digital-borne violation of any

  • f these requirements
slide-10
SLIDE 10

5 Robot-specific Attacks

slide-11
SLIDE 11

Attack 1: Control Loop Alteration

!

slide-12
SLIDE 12

Attack 2: Tampering with Calibration Parameters

slide-13
SLIDE 13

Attack 3: Tampering with the Production Logic

slide-14
SLIDE 14

Attack 4 & 5: (Perceived) Robot State Alteration

slide-15
SLIDE 15

Custom Physical Protections, if any (despite regulations)

slide-16
SLIDE 16

From Attacks to Threat Scenarios

1) Production Plant Halting 2) Production Outcome Alteration 3) Physical Damage 4) Unauthorized Access 5) Ransom requests to disclose micro defects

slide-17
SLIDE 17

Case Study

slide-18
SLIDE 18
slide-19
SLIDE 19

ARM, Windows CE .NET 3.5 VxWorks 5.x RTOS (PPC, x86) FPGAs and discrete logic

slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23

Attack surface

USB port LAN WAN Radio

slide-24
SLIDE 24

Industrial Routers

slide-25
SLIDE 25

Vulnerabilities

  • a. BOF leading to RCE (ABBVU-DMRO-124641)
  • b. BOF in FlexPendant (ABBVU-DMRO-124645)
  • c. BOF in /command endpoint (ABBVU-DMRO-128238)
  • d. Command Injection (ABBVU-DMRO-124642)
  • e. Authentication bypass (ABBVU-DMRO-124644)
slide-26
SLIDE 26

Full Controller Exploitation

slide-27
SLIDE 27

Attack POCs

1) Accuracy Violation: PID parameters detuning (Attack 1) 2) Safety Violation: User-Perceived Robot State Alteration (Attack 4) 3) Integrity Violation: Control-loop alteration (Attack 1)

DEMO

slide-28
SLIDE 28

POC 1: accuracy violation (video)

slide-29
SLIDE 29

Attack POCs

1) Accuracy Violation: PID parameters detuning (Attack 1) 2) Safety Violation: User-Perceived Robot State Alteration (Attack 4) 3) Integrity Violation: Control-loop alteration (Attack 1)

slide-30
SLIDE 30

POC 2: Safety Violation

Teach Pendant Malicious DLL

slide-31
SLIDE 31

POC 2: Safety Violation

Teach Pendant Malicious DLL

slide-32
SLIDE 32

Attack POCs

1) Accuracy Violation: PID parameters detuning (Attack 1) 2) Safety Violation: User-Perceived Robot State Alteration (Attack 4) 3) Integrity Violation: Control-loop alteration (Attack 1)

slide-33
SLIDE 33

POC 3: Integrity Violation

➢ Robot’s arm collapse on itself ➢ Motors substantially damaged Quite a risky POC! Verified with a robotics’ expert

slide-34
SLIDE 34

Conclusions: Future Challenges

➢ New standards, beyond safety issues ➢ Attack detection and hardening ➢ Secure collaborative robots ➢ (Detailed countermeasures in the paper)

slide-35
SLIDE 35

Questions?

Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, Stefano Zanero San José (CA), May 22nd, 2017 38th IEEE Symposium on Security and Privacy

http://robosec.org