Side-channel based intrusion detection for industrial control systems
“I have no idea what this device is doing, but at least it’s still doing the same thing.” CRITIS 2017, October 9th, 2017
Pol Van Aubel
1/31
Side-channel based intrusion detection for industrial control - - PowerPoint PPT Presentation
Side-channel based intrusion detection for industrial control systems I have no idea what this device is doing, but at least its still doing the same thing. CRITIS 2017, October 9 th , 2017 Pol Van Aubel 1/31 Authors Joint work:
“I have no idea what this device is doing, but at least it’s still doing the same thing.” CRITIS 2017, October 9th, 2017
Pol Van Aubel
1/31
Authors
Joint work: Pol Van Aubel
pol.vanaubel@cs.ru.nl
Radboud University iCIS|Digital Security
Łukasz Chmielewski
chmielewski@riscure.com
Riscure BV
Kostas Papagiannopoulos
k.papagiannopoulos@cs.ru.nl
Radboud University iCIS|Digital Security
Christian Doerr
c.doerr@tudelft.nl
Delft University of Technology Pol Van Aubel
2/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
3/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
4/31
The scenario
What if an attacker changes the software on the control systems?
Pol Van Aubel
5/31
The problem
After a program is
how do we ensure that we are always running that program?
Pol Van Aubel
6/31
Prevent other software from running
Verify software signatures with a Trusted Platform Module. Or similar solutions, requiring integration.
Pol Van Aubel
7/31
Detect when other software is running
Requiring integration. May be circumvented or worse.
Pol Van Aubel
8/31
What about the legacy?
Large number of deployed systems. We need an option that can be used
There are no silver bullets.
Pol Van Aubel
9/31
Side-channel based intrusion detection
We propose a system to detect software compromise of embedded industrial control systems by using the electromagnetic side-channel emissions of the underlying hardware.
Pol Van Aubel
10/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
11/31
Side-channels
What is a side-channel? Non-functional transmission of information about the state of a system.
Mostly used for breaking cryptography / security / privacy.
Pol Van Aubel
12/31
How to capture EM-radiation?
Pol Van Aubel
13/31
What does it look like?
Pol Van Aubel
14/31
PLCs 101
Dedicated industrial computers that are built for
Pol Van Aubel
15/31
PLCs 101
Operate on a “scan cycle”:
Pol Van Aubel
16/31
What does it look like?
Pol Van Aubel
17/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
18/31
Attacker model
Attacker can upload new software to the PLC to replace or modify the existing user program. Attacker cannot control the PLC operating system.
Pol Van Aubel
19/31
Two-layered intrusion detection
Pol Van Aubel
20/31
Timing side-channel layer
– EM-analysis – OS-emitted signal
Pol Van Aubel
21/31
Determine runtime through EM-analysis
Pol Van Aubel
22/31
EM side-channel layer
Distinguish between programs with minor modifications
Pol Van Aubel
23/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
24/31
Best results – comparison constant
Pol Van Aubel
25/31
Best results – comparison constant
Pol Van Aubel
26/31
Best results – program logic
Pol Van Aubel
27/31
Best results – program logic
Pol Van Aubel
28/31
Outline
Software behaviour verification Side-channel analysis Proposed system Results Future work, conclusions, and discussion
Pol Van Aubel
29/31
Future work
Pol Van Aubel
30/31
Main conclusions
https://polvanaubel.com/research/em-ics/code/. Pol Van Aubel
pol.vanaubel@cs.ru.nl PGP key fingerprint: 5937 4550 F873 5C57 A778 BDE2 B563 848A 5F60 0EAE
Paper 59
Kostas Papagiannopoulos
k.papagiannopoulos@cs.ru.nl
Łukasz Chmielewski
chmielewski@riscure.com
Christian Doerr
c.doerr@tudelft.nl
Pol Van Aubel
31/31