论文标题

ICSPATCH:使用数据依赖图中的工业控制系统中的自动漏洞本地化和非侵入性热门

ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs

论文作者

Rajput, Prashant Hari Narayan, Doumanidis, Constantine, Maniatakos, Michail

论文摘要

在操作技术(OT)和信息技术(IT)设备之间实现广泛的相互交流的范式转移使IT世界典型的脆弱性传播到OT方面。因此,删除了过去通过空气散发提供的安全层,这使得针对OT设备的安全补丁成为了很难的要求。常规的修补程序涉及重新启动以将修补代码加载到主内存中,该代码不适用于控制关键过程,该设备由于停机而控制关键进程,因此需要内存中内存漏洞。此外,这些控制二进制文件通常是由内部专有编译器编制的,进一步阻碍了修补过程,并将依赖OT供应商依赖于快速脆弱性发现和补丁开发。当前的最新热门方法仅专注于固件和/或RTO。因此,在这项工作中,我们开发了ICSPATCH,这是使用数据依赖图(DDGS)自动化控制逻辑漏洞本地化的框架。在DDGS的帮助下,ICSPATCH指出了控制应用程序中的漏洞。作为独立的第二步,ICSPATCH可以直接在可编程逻辑控制器的主要内存中进行控制应用程序中的非感染热漏洞,同时维护可靠的连续操作。为了评估我们的框架,我们在来自不同关键基础设施部门的24个脆弱的控制应用程序二进制文件的合成数据集上测试了ICSPATCH。结果表明,ICSPATCH可以成功定位所有漏洞并相应地生成补丁。此外,该补丁增加了执行周期的可延迟可延迟,同时保持了对漏洞的正确性和保护。

The paradigm shift of enabling extensive intercommunication between the Operational Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the IT world to propagate to the OT side. Therefore, the security layer offered in the past by air gapping is removed, making security patching for OT devices a hard requirement. Conventional patching involves a device reboot to load the patched code in the main memory, which does not apply to OT devices controlling critical processes due to downtime, necessitating in-memory vulnerability patching. Furthermore, these control binaries are often compiled by in-house proprietary compilers, further hindering the patching process and placing reliance on OT vendors for rapid vulnerability discovery and patch development. The current state-of-the-art hotpatching approaches only focus on firmware and/or RTOS. Therefore, in this work, we develop ICSPatch, a framework to automate control logic vulnerability localization using Data Dependence Graphs (DDGs). With the help of DDGs, ICSPatch pinpoints the vulnerability in the control application. As an independent second step, ICSPatch can non-intrusively hotpatch vulnerabilities in the control application directly in the main memory of Programmable Logic Controllers while maintaining reliable continuous operation. To evaluate our framework, we test ICSPatch on a synthetic dataset of 24 vulnerable control application binaries from diverse critical infrastructure sectors. Results show that ICSPatch could successfully localize all vulnerabilities and generate patches accordingly. Furthermore, the patch added negligible latency increase in the execution cycle while maintaining correctness and protection against the vulnerability.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源