Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Abstract

Input/Output is the mechanism through which Programmable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper with the integrity and availability of PLCs I/O by exploiting certain pin control operations and the lack of hardware interrupts associated to them.

Original languageEnglish
Title of host publicationCritical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers
Subtitle of host publication11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers
EditorsG. Havarneanu, R. Setola, H. Nassopoulos, S. Wolthusen
Place of PublicationDordrecht
PublisherSpringer
Pages1-12
Number of pages12
ISBN (Electronic)978-3-319-71368-7
ISBN (Print)978-3-319-71367-0
DOIs
Publication statusPublished - 10 Oct 2016
Event11th International Conference on Critical Information Infrastructures Security (CRITIS 2016) - Paris, France
Duration: 10 Oct 201612 Oct 2016
Conference number: 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10242 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Critical Information Infrastructures Security (CRITIS 2016)
Abbreviated titleCRITS 2016
Country/TerritoryFrance
CityParis
Period10/10/1612/10/16

Funding

The work of the first, third and fourth authors has been partially supported by the European Commission through project FP7-SEC-607093-PREEMPTIVE funded by the 7th Framework Program.

Keywords

  • Exploiting
  • ICS
  • PLC
  • SoC

Fingerprint

Dive into the research topics of 'Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation'. Together they form a unique fingerprint.

Cite this