Research on Memory Access Vulnerability Analysis Technique in SCADA Protocol Implementation

نویسندگان

  • FANG LAN
  • WANG CHUNLEI
  • HE RONGHUI
چکیده

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA protocol implementation. Firstly, the memory taintedness model of SCADA protocol implementation is formally defined. Based on this model, the detection algorithm of memory access vulnerability is proposed. Finally, the model and algorithm are validated through the experiment of vulnerability analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. The emergence of Internet and World Wide Web...

متن کامل

Software Vulnerability Design and Approaches for Securing SCADA Control Systems

Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. Where security has been a consideration, there has been no clear methodology to assess the security impacts brought about by attacks. Worst, there have been no or very little security tools that have been released publicly. This research ai...

متن کامل

Do-it-yourself Scada Vulnerability Testing with Lzfuzz

Security vulnerabilities typically start with bugs: in input validation, and also in deeper application logic. Fuzz-testing is a popular security evaluation technique in which hostile inputs are crafted and passed to the target software in order to reveal such bugs. However, for SCADA software used in critical infrastructure, the widespread use of proprietary protocols makes it difficult to app...

متن کامل

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open pr...

متن کامل

Adapting Bro into SCADA: Building Specification-based Intrusion Detection System for DNP3 Protocol

Modern SCADA systems are increasingly adopting Internet technology to control industry processes. With their security vulnerabilities exposed to public networks, an attacker is able to penetrate into these control systems to put remote facilities in danger. To detect such attacks, SCADA systems require an intrusion detection technique that can monitor network traffic based on proprietary networ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010