An Efficient Trusted Computing Base (TCB) for a SCADA System Monitor

نویسندگان

  • A. Velagapalli
  • M. Ramkumar
چکیده

A fundamental requirement for the ability to monitor a SCADA system is a measure for ensuring that the monitoring process has an accurate picture of the current states of all sensors and actuators in the system. A misrepresentation of the state can be perpetrated either by sending misleading information (for example, by impersonating a sensor) or by preventing sensor measurements from reaching the monitor (for example, jamming). We identify a minimal trusted computing base (TCB) for an untrusted SCADA monitor, and propose a strategy to leverage the TCB efficiently to realize the assurance that “any misrepresentation of the SCADA system state (the states of all sensors and actuators) will be identified.” In the proposed approach the TCB is a set of well-defined and simple functions performed by a trusted module. The untrusted monitor is required to periodically offer proof to the trusted module regarding the integrity of dynamic sensor data received from all sensors. Keywords-SCADA Security, Merkle trees, Authenticated Denial.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HypeBIOS: Enforcing VM Isolation with Minimized and Decomposed Cloud TCB

Virtualization has made cloud computing a popular trend by virtue of its elastic “data anywhere” and “computing anywhere”. However, traditional virtualization architectures usually have three drawbacks: 1) being vulnerable to many known attacks targeting at the large software stacks; 2) endowing too much power to cloud providers, who can fully control the Virtual Machine Monitor (VMM) and the m...

متن کامل

An Efficient TCB for a Generic Data Dissemination System

Several applications fall under the broad umbrella of data dissemination systems (DDS), where providers and consumers of information rely on untrusted, or even unknown middle-men to disseminate and acquire data. This paper proposes a security architecture for a generic DDS by identifying a minimal trusted computing base (TCB) for middle-men and leveraging the TCB to provide useful assurances re...

متن کامل

Resilient Reference Monitor for Distributed Access Control via Moving Target Defense

Effective access control is dependent not only on the existence of strong policies but also on ensuring that the access control enforcement subsystem is adequately protected. Protecting this subsystem has not been adequately addressed in the literature. In general, it is assumed to be implemented as a reference monitor in a trusted computing base (TCB) that is tamper-proof. However, in distribu...

متن کامل

Improving system security through TCB reduction

The OS (operating system) is the primary target of todays attacks. A single exploitable defect can be sufficient to break the security of the system and give fully control over all the software on the machine. Because current operating systems are too large to be defect free, the best approach to improve the system security is to reduce their code to more manageable levels. This work shows how ...

متن کامل

Improving Virtualization Security by Splitting Hypervisor into Smaller Components

In cloud computing, the security of the infrastructure is determined by the hypervisor (or Virtual Machine Monitor, VMM) design. Unfortunately, in recent years, many attacks have been developed to compromise the hypervisor, taking over all virtual machines running above the hypervisor. Due to the functions a hypervisor provides, it is very hard to reduce its size. Including a big hypervisor in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010