Abstract
Input/Output is the mechanism through which Programmable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper with the integrity and availability of PLCs I/O by exploiting certain pin control operations and the lack of hardware interrupts associated to them.
Original language | English |
---|---|
Title of host publication | Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers |
Subtitle of host publication | 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers |
Editors | G. Havarneanu, R. Setola, H. Nassopoulos, S. Wolthusen |
Place of Publication | Dordrecht |
Publisher | Springer |
Pages | 1-12 |
Number of pages | 12 |
ISBN (Electronic) | 978-3-319-71368-7 |
ISBN (Print) | 978-3-319-71367-0 |
DOIs | |
Publication status | Published - 10 Oct 2016 |
Event | 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016) - Paris, France Duration: 10 Oct 2016 → 12 Oct 2016 Conference number: 11 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 10242 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016) |
---|---|
Abbreviated title | CRITS 2016 |
Country/Territory | France |
City | Paris |
Period | 10/10/16 → 12/10/16 |
Keywords
- Exploiting
- ICS
- PLC
- SoC
Fingerprint
Dive into the research topics of 'Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation'. Together they form a unique fingerprint.Press / Media
-
Vanishing Point: New PLC Malware Leverages Processor Problems to Go Dark
Ali Abbasi
3/12/16
1 item of Media coverage
Press/Media: Expert Comment