Designed-in Security for Cyber-Physical Systems

نویسندگان

  • Sean Peisert
  • Jonathan Margulies
  • David M. Nicol
  • Himanshu Khurana
  • Chris Sawall
چکیده

T here are at least two types of security vulnerabilities: flawed or insufficient software behavior specifications that allow compromise—for example, authentication that is lacking or that can be spoofed—and incorrect implementation of specifications— buffer overflows being a classic example and Heartbleed being a notable recent one. The sad truth is that the state of the art in specification development and implementation doesn’t deliver secure software. So the question is, what does designed-in security mean in each case—for CPSs in particular—and what are the challenges? For software implementation, designed-in security includes programming language features that enhance security. Many securityenhancing programming language ideas have been proposed, but none have had traction in CPSs. Typechecking of data objects passed through interfaces is an example; at compile time and potentially at runtime, the runtime system analyzes which objects pass between software modules or routines and ensures that what’s passed looks like what’s expected. Types can have attributes, which let us specify interfaces whether encryption or authentication is required. However, this kind of dynamic introspection takes time. A CPS’s software component usually runs in a real-time control loop, which means it must be fast enough to keep up with a schedule. In addition, the software must have a predictable execution time, and features such as automatic garbage collection impede that. Yet, dynamic memory management errors are a common source of vulnerabilities. My hope is that we can discover a sweet spot in the spectrum of programming language features that gives real-time system designers sufficient speed, predictable behavior, and features that enhance security. I would also hope for widespread adoption of such a language by the energy industry. Frankly, I think the latter problem is more difficult owing to the many understandable but very real business impediments to change, such as the immaturity of such technology and a lack of vendor support. T he November/December 2014 issue of IEEE Security & Privacy will focus on control system security in the energy industry. As a preview, guest editors Sean Peisert and Jonathan Margulies hosted a roundtable discussion featuring three experts from the energy sector—David M. Nicol, Himanshu Khurana, and Chris Sawall—who offer different perspectives on the meaning and challenges of “designed-in security”: one from academia, one from a cyber-physical system (CPS) provider, and one from an end asset owner and user. Like the parable of the blind men and the elephant, we get three fairly distinct viewpoints. The academic highlights foundational issues and talks about emerging technology that can help us design and implement secure software in CPSs. The provider’s view includes components of the academic view but emphasizes the secure system development process and the standards that the system must satisfy. The user issues a call to action and offers ideas that will ensure progress.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Review of Attack Detection Scheme for Cyber Physical Security System

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

متن کامل

Trojan Detection and Side-Channel Analyses for Cyber-Security in Cyber-Physical Manufacturing Systems

As the maliciousness and frequency of cyber-attacks continues to grow, the safety and security of cyber-physical critical infrastructures, such as manufacturing, is quickly becoming a significant concern across the globe. Outside of traditional intellectual property theft, attacks against manufacturing systems pose a threat to maintaining a product’s design intent. More specifically, such attac...

متن کامل

Security Education for Smart Grid: Materials, Experiments, and Evaluation

With the fast development of Cyber-Physical systems (CPS), security in these special application environments starts to attract more and more efforts. In this project, we form a team of researchers in information security, power systems, simulation, and education evaluation to jointly develop educational materials and experiments for security education in smart grid. Multiple course modules for...

متن کامل

Challenges in Security for Cyber-Physical Systems

The design of security for cyber-physical systems must take into account several characteristics common to such systems. Among these are feedback between the cyber and physical environment, distributed management and control, uncertainty, real-time requirements, and geographic distribution. This paper discusses these characteristics and suggests a design approach that better integrates security...

متن کامل

Towards a Framework for Assuring Cyber Physical System Security

Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2014