Characterizing Building Automation System Attacks and Attackers

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
67 Downloads (Pure)

Abstract

A building automation system (BAS) is an instance of a cyber-physical-system (CPS) in control of building functionalities like lighting, ventilation, CCTVs, and access control. The amount of “smart” buildings has been growing over the years, introducing new technologies which are now being targeted by attackers. In this work, we present the first collection of publicly disclosed security incidents involving Building Automation Systems (BAS). We then provide a qualitative study of attackers targeting BAS and unveil their main characteristics and differences to traditional CPS attackers. We learn that, generally speaking, BAS attackers show a lower sophistication level and that most BAS attacks target the smart IoT components present in modern buildings. Further, access to the BAS is often not the attacker's final goal but "just" a mean to achieve their actual goal. Lastly, we do not observe any advanced, state-sponsored BAS attacks hinting that these play less of a role in BAS (compared to CPS).
Original languageEnglish
Title of host publicationProceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022
PublisherInstitute of Electrical and Electronics Engineers
Pages139-149
Number of pages11
ISBN (Electronic)978-1-6654-9560-8
ISBN (Print)978-1-6654-9561-5
DOIs
Publication statusPublished - Jul 2022
Event4th Workshop on Attackers and Cyber-Crime Operations - Genoa, Italy
Duration: 6 Jun 20226 Jun 2022
Conference number: 4
https://wacco-workshop.org/past/2022

Workshop

Workshop4th Workshop on Attackers and Cyber-Crime Operations
Abbreviated titleWACCO 2022
Country/TerritoryItaly
CityGenoa
Period6/06/226/06/22
Internet address

Keywords

  • BAS
  • CPS
  • ICS
  • attack model
  • building automation system
  • cyber security
  • industrial control system

Fingerprint

Dive into the research topics of 'Characterizing Building Automation System Attacks and Attackers'. Together they form a unique fingerprint.

Cite this