DocumentCode :
3003585
Title :
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
Author :
Bellettini, Carlo ; Rrushi, Julian L.
Author_Institution :
Univ. degli Studi di Milano, Milan
fYear :
2007
fDate :
20-22 June 2007
Firstpage :
341
Lastpage :
348
Abstract :
Pointer taintedness is a concept which has been successfully employed as basis for vulnerability analysis of C/C ++ source code, and as a run-time mitigation technique against memory corruption attacks. Nevertheless, pointer taintedness interferes with the specification of several industrial control protocols. As a consequence it is not directly usable in detecting memory corruption vulnerabilities in implementations of those industrial control protocols. Furthermore, source-code analysis may have no visibility on certain low-level vulnerabilities since there may be a considerable difference between what programmers intend with the source code they write and what the CPU really executes. A set of memory corruption vulnerabilities specific to implementations of industrial control protocols may escape source code analysis as they are related to a dynamic organization of data in memory. In this paper we define a new concept referred to as memory access taintedness. We discuss the logical motivations behind our definition of memory access taintedness and demonstrate that memory access taintedness is fully employable in vulnerability analysis of the machine code of implementations of industrial control protocols. We analyze the main low-level characteristics of both traditional attacks and attacks specific to process control systems, and demonstrate the ability of memory access taintedness to detect memory corruption vulnerabilities. We represent memory access taintedness as a decision tree and use it as the fundamental component of a finite state machine model we devised for the purpose of dynamically detecting memory corruption vulnerabilities in implementations of industrial control protocols.
Keywords :
SCADA systems; decision trees; memory protocols; process control; program diagnostics; storage management; SCADA protocol binaries; critical infrastructure defense; decision tree; finite state machine model; industrial control protocols; memory access taintedness; memory corruption attacks; pointer taintedness; source-code analysis; vulnerability analysis; Access protocols; Conferences; Defense industry; Distributed control; Electrical equipment industry; Industrial control; Information analysis; Process control; Programmable control; SCADA systems; Critical infrastructure defense; Industrial control protocols; SCADA systems; Vulnerability analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
Conference_Location :
West Point, NY
Print_ISBN :
1-4244-1304-4
Electronic_ISBN :
1-4244-1304-4
Type :
conf
DOI :
10.1109/IAW.2007.381952
Filename :
4267580
Link To Document :
بازگشت