A Quantitative Evaluation of the Target Selection of Havex ICS Malware Plugin

نویسندگان

  • Julian Rrushi
  • Hassan Farhangi
  • Clay Howey
  • Kelly Carmichael
  • Joey Dabell
چکیده

While most of the current research focus is rightfully put on finding and mitigating vulnerabilities in industrial control systems (ICS), the opposite angle, namely researching operational weaknesses or unintelligent decisions of ICS malware that make them susceptible to detection, defensive entrapment, and forensics at large, is lesser explored. In this paper we perform a quantitative evaluation of the ability of Havex ICS malware plugin to correctly discover and query its target industrial control systems. We discuss the reverse engineering and analysis of various blocks of machine code of the Havex ICS malware plugin that pertain to its target selection process. We then quantify mathematically several performance measures of its target selection process. We find that despite its notoriety in the media as a nation state sponsored attack code, the Havex ICS malware plugin uses a plain and unsophisticated target selection process. That weakness in the malware opens the way to targeted defensive mechanisms to accurately neutralize the Havex malware and alike.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of the strategies of target market selection on the basis of IFE and EFE matrixes using linmap technique (A case study of Bushehr province)

One of the most important requirements of developing appropriate strategies for international marketing is correct identification of target markets. Using quantitative techniques and decision making skills will lead to better results regarding the evaluation of marketing strategies. In this study, first we have used internal factor evaluation (IFE) matrix for recognizing and comparing strengths...

متن کامل

Feature selection using genetic algorithm for classification of schizophrenia using fMRI data

In this paper we propose a new method for classification of subjects into schizophrenia and control groups using functional magnetic resonance imaging (fMRI) data. In the preprocessing step, the number of fMRI time points is reduced using principal component analysis (PCA). Then, independent component analysis (ICA) is used for further data analysis. It estimates independent components (ICs) of...

متن کامل

A Quantitative Evaluation of Maintainability of Software Architecture Styles

Proper decisions play a crucial role in any software architecture design process. An important decision of design stage is the selection of a suitable software architecture style. Lack of investigation on the quantitative impact of architecture styles on software quality attributes is the main problem in using such styles. Consequently, the use of architecture styles in designing is based on th...

متن کامل

A Two-phase Model for Product Design Development and Evaluation and Supplier Selection in Product Configuration Change Process (Case study: SUPCO)

A supply chain is composed of a complex sequence of processing stages, ranging from raw materials supplies, parts manufacturing, components and end-products assembling, to the delivery of end products. In the context of supply chain management, supplier selection decision is considered one of the key issues faced by operations and purchasing managers to remain competitive. Therefore, requiremen...

متن کامل

A Two-phase Model for Product Design Development and Evaluation and Supplier Selection in Product Configuration Change Process (Case study: SUPCO)

A supply chain is composed of a complex sequence of processing stages, ranging from raw materials supplies, parts manufacturing, components and end-products assembling, to the delivery of end products. In the context of supply chain management, supplier selection decision is considered one of the key issues faced by operations and purchasing managers to remain competitive. Therefore, requiremen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015