论文标题
旨在全面了解可编程逻辑控制器的运行时间安全:一项为期3年的实证研究
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study
论文作者
论文摘要
可编程逻辑控制器(PLC)是工业控制系统(ICS)中的核心控制设备,该设备控制和监视诸如电网之类的潜在物理植物。 PLC最初是设计用于在受信任的工业网络中工作的,但是一旦将其部署在面向互联网(或穿透)网络中,该网络可能会变得脆弱。然而,缺乏对现代现实世界PLC的运行时安全性的系统经验分析。为了缩小这一差距,我们介绍了13个领先供应商的23个现成的23个现成的PLC上的第一个大规模测量。我们发现了许多常见的安全问题和未开发的含义,这些问题应在设计和实施中更仔细地解决。总而言之,无监督的逻辑应用程序可能会导致系统资源/特权滥用,从而为对手提供了远程运行时系统控制流的新手段(而无需利用内存漏洞); 2)不当访问控制机制带来了许多未经授权的访问含义; 3)专有或半专有协议在运行时数据的机密性和完整性保护方面很脆弱。我们从经验上评估了多个PLC上的相应攻击向量,这表明安全含义是严重且广泛的。我们的发现被负责任地报告给了相关方,并通过7个指定的CVE确认了20个错误。
Programmable Logic Controllers (PLCs) are the core control devices in Industrial Control Systems (ICSs), which control and monitor the underlying physical plants such as power grids. PLCs were initially designed to work in a trusted industrial network, which however can be brittle once deployed in an Internet-facing (or penetrated) network. Yet, there is a lack of systematic empirical analysis of the run-time security of modern real-world PLCs. To close this gap, we present the first large-scale measurement on 23 off-the-shelf PLCs across 13 leading vendors. We find many common security issues and unexplored implications that should be more carefully addressed in the design and implementation. To sum up, the unsupervised logic applications can cause system resource/privilege abuse, which gives adversaries new means to hijack the control flow of a runtime system remotely (without exploiting memory vulnerabilities); 2) the improper access control mechanisms bring many unauthorized access implications; 3) the proprietary or semi-proprietary protocols are fragile regarding confidentiality and integrity protection of run-time data. We empirically evaluated the corresponding attack vectors on multiple PLCs, which demonstrates that the security implications are severe and broad. Our findings were reported to the related parties responsibly, and 20 bugs have been confirmed with 7 assigned CVEs.