An Efficient Trusted Computing Base (TCB) for a SCADA System Monitor
نویسندگان
چکیده
A fundamental requirement for the ability to monitor a SCADA system is a measure for ensuring that the monitoring process has an accurate picture of the current states of all sensors and actuators in the system. A misrepresentation of the state can be perpetrated either by sending misleading information (for example, by impersonating a sensor) or by preventing sensor measurements from reaching the monitor (for example, jamming). We identify a minimal trusted computing base (TCB) for an untrusted SCADA monitor, and propose a strategy to leverage the TCB efficiently to realize the assurance that “any misrepresentation of the SCADA system state (the states of all sensors and actuators) will be identified.” In the proposed approach the TCB is a set of well-defined and simple functions performed by a trusted module. The untrusted monitor is required to periodically offer proof to the trusted module regarding the integrity of dynamic sensor data received from all sensors. Keywords-SCADA Security, Merkle trees, Authenticated Denial.
منابع مشابه
HypeBIOS: Enforcing VM Isolation with Minimized and Decomposed Cloud TCB
Virtualization has made cloud computing a popular trend by virtue of its elastic “data anywhere” and “computing anywhere”. However, traditional virtualization architectures usually have three drawbacks: 1) being vulnerable to many known attacks targeting at the large software stacks; 2) endowing too much power to cloud providers, who can fully control the Virtual Machine Monitor (VMM) and the m...
متن کاملAn Efficient TCB for a Generic Data Dissemination System
Several applications fall under the broad umbrella of data dissemination systems (DDS), where providers and consumers of information rely on untrusted, or even unknown middle-men to disseminate and acquire data. This paper proposes a security architecture for a generic DDS by identifying a minimal trusted computing base (TCB) for middle-men and leveraging the TCB to provide useful assurances re...
متن کاملResilient Reference Monitor for Distributed Access Control via Moving Target Defense
Effective access control is dependent not only on the existence of strong policies but also on ensuring that the access control enforcement subsystem is adequately protected. Protecting this subsystem has not been adequately addressed in the literature. In general, it is assumed to be implemented as a reference monitor in a trusted computing base (TCB) that is tamper-proof. However, in distribu...
متن کاملImproving system security through TCB reduction
The OS (operating system) is the primary target of todays attacks. A single exploitable defect can be sufficient to break the security of the system and give fully control over all the software on the machine. Because current operating systems are too large to be defect free, the best approach to improve the system security is to reduce their code to more manageable levels. This work shows how ...
متن کاملImproving Virtualization Security by Splitting Hypervisor into Smaller Components
In cloud computing, the security of the infrastructure is determined by the hypervisor (or Virtual Machine Monitor, VMM) design. Unfortunately, in recent years, many attacks have been developed to compromise the hypervisor, taking over all virtual machines running above the hypervisor. Due to the functions a hypervisor provides, it is very hard to reduce its size. Including a big hypervisor in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010