SlideShare a Scribd company logo
1 of 118
Cyber Physical Systems:
Security and Safety
Singapore
University
of
Technology
and
Design
Aditya P Mathur
December 15, 2012
International Workshop on Information
Security (IWIS-2012)
Questions of interest
2
What is a CPS?
What are the security issues in CPS and how do they differ
from those in traditional information systems?
To what extent can a CPS be secured against cyber crime?
Are there some fundamental design principles that ought to
be used when designing or upgrading a CPS?
What are the curricular ramifications of CPS security?
Coverage
3
CPS examples and concerns, components, abstraction, incidents
Traditional versus CPS security
Industrial control systems
Two real-life incidents: Toys and Iran
Control systems: basics
Case studies: Medical devices and Irrigation Systems
CPS: design principles, research and educational needs
Cyber Physical Systems: Examples
4
Shipping
5
Several countries and cities in the world have some of
the world's busiest ports and large transshipment
hubs.
For example, PSA Singapore Terminals are connected
by 200 shipping lines to 600 ports in 123 countries,
with daily sailings to every major port of call in the
world.
Healthcare
6
Singapore offers Asia's best healthcare system, and its
standard of medical practice ranks among the best in
the world.
The Joint Commission International (JCI) has
accredited 11 hospitals and three medical centers in
Singapore.
Infocomm
7
Singapore today ranks as the second most network-
ready country in the world and the first in Asia,
according to the World Economic Forum's Global
Information Technology Report 2010/2011.
Energy
8
“Today, Singapore is the undisputed oil hub in Asia and
is one of the world’s top three export refining
centers....”
Smart Grid - Overview
What is a Smart Grid?
• Smart Grid : Overlay electrical grid with sensors (phasor monitoring
units - PMUs) and control systems (SCADA) to enable:
– reliable and secure network monitoring, load balancing, energy
efficiency via smart meters, and integration of new energy sources
Smart Grid – Smart Metering
Smart Metering Privacy Issue (1)
Smart Metering Privacy Issue (2)
Privacy is not Secrecy
Privacy is not Secrecy!
• Privacy: the ability to prevent unwanted transfer of information (via
inference or correlation) when legitimate transfers happen.
• But privacy is not secrecy!
• Privacy problem: disclosing data provides informational utility while
also enabling potential loss of privacy
– Every user is potentially an adversary
– Encryption is not a solution!
?= Eve
Privacy versus Secrecy
Privacy vs. Secrecy!
• Privacy: the ability to prevent unwanted transfer of information (via
inference or correlation) when legitimate transfers happen.
• But privacy is not secrecy!
• Secrecy Problem: Protocols and primitives clearly distinguish a
malicious adversary vs. intended user and secret vs. non-secret
data.
– Encryption may be a solution.
Possible Solutions
• Robust Smart Metering Design with privacy
constraints
• Utility-Privacy Tradeoff Design
• Privacy Invasion Detection/Prevention
• Data masking
• Data Anonymisation
Other Potential Concerns:
16
CPS Vulnerability
17
Are your energy, healthcare, water, shipping,
transportation systems vulnerable to network attacks?
What, if any, are the vulnerabilities in such systems?
When exploited, how might such vulnerabilities affect
people?
CPS Control systems
18
Are the control systems in your large and critical CPSs
systems robust enough to withstand deception
attacks?
Are these control systems programmed to
withstand denial of service attacks?
Surviving from Physical attacks
• What happens if we lose
part, or even most of the
computing systems?
• Will redundancy alone
solve the problem?
• How to measure and
quantify of resilience of
current systems?
• How to ensure high
availability of CPS?
19
Defending Against Device Capture Attack
• Physical devices in CPS
systems may be captured,
compromised and released
back by adversaries.
• How to identify and
ameliorate the system
damage with trusted
hardware but potentially
untrusted/modified
software?
20
Real-Time Security in CPS
• CPS often requires real-
time responses to
physical processes
• Little Study on how
attacks affect the real-
time properties of CPS
• How to guarantee real-
time requirements under
attack?
21
Concurrency in CPS
• CPS is concurrent in
nature, running both
cyber and physical
processes
• Little research on
handling large-scale
concurrent systems
22
Collaboration and Isolation
• CPS needs to effectively
isolate attackers while
maintaining collaborations
among different, distributed
system components
• How to avoid cascading
failures while minimizing
system performance
degradation?
23
Cyber Physical System: Components
24
CPS: Greenhouse
25
Temperature
sensor
Green house
Controller
Network
F
anactuator
CPS: Blending process
26
CPS Other examples
27
Pacemaker
ICD (Implantable Cardiovascular Defibrillator)
Insulin pump
Neuro-stimulators
Cyber Physical Systems: Abstraction
28
CPS: Component view
29
CPS: Systems View
30
Physical System
Sensor
Control System
Actuator
y
u: input
x: state
Estimation and control
: Network
CPS Network-based Attacks
31
Physical System
Sensor
Control System
Actuator
y’ not y:
Sensor
compromised
u’ not u
controller
compromised
Network
jammed
Existing Techniques
32
Authentication
Digital signatures
Access control
Intrusion detection
Enhancement of existing approaches
33
How deception and DoS attacks affect application layer
performance (e.g., estimation and control)?
Intrusion detection and deception attacks in control
systems?
What if a human is not in the loop for intrusion detection?
CPS incident statistics
34
CPS incident databases
35
BCIT Industry security incident databaseTOFINO
http://www.tofinosecurity.com/
Cyber incidents involving control systems, Robert Turk,
October 2005, Idaho National Laboratory, INL/EXT-05-00671
Wurldtech: http://www.wurldtech.com/
http://www.tofinosecurity.com/blog/2012-scada-security-
predictions-how-did-eric-byres-do
Sample CPS incidents
36
2010: Stuxnet [http://www.tofinosecurity.com/stuxnet-
central]
Nov 2012: kAndyKAn3 worm attacks North Pole Toys
Over 500 SCADA vulnerabilities found in 2011
2010: Night Dragon, Duqu, Nitro
CPS incident report statistics
37
Empirical Analysis of publicly disclosed ICS vulnerabilities since
2001” by Sean McBride
CPS incident (more) statistics
38
42% of all incidences were conducted by means of mobile
malware
61% of the perpetrators originated from external sources
43% of perpetrators were malware authors
Traditional versus CPS security
39
Traditional
40
Confidentiality: Ability to maintain secrecy from
unauthorized users.
Integrity: Trustworthiness of data received; lack of this leads
to deception.
Availability: Ability of the system being accessible
CPS
41
Timeliness: responsiveness, freshness of data
Ref: A Taxonomy of Cyber Attacks on SCADA Systems, Zhu et al., UC Berkeley.
Availability: unexpected outages
Integrity: genuine data displayed and received by the controller
Confidentiality: Information regarding SCADA not available to
any unauthorized individual
Graceful degradation
Industrial Control Systems
42
SCADA
43
Supervisory Control and Data Acquisition System
It is an industrial control system that consists of RTUs,
PLCs, and HMIs to control an industrial process.
Use: Manufacturing, power generation, fabrication,
oil and gas pipelines, etc.
RTU
44
Microprocessor controlled Remote
Terminal/Telemetry Unit
Interface between physical objects and a SCADA.
Transmits telemetry data to SCADA. Example: water
quality.
Siemens LC150
Pump Control
Telemetry Unit
PLC
45
Programmable Logic Controller
A computer to control the operation of electro-
mechanical devices such as pumps, motors, switches
Hard real-time system
Programs stored in non-volatile memory, battery backup
Programmed using State Logic, Basic, C:
IEC 61131-3 programming standard
Siemens S7-mEC
embedded
controller
PLC Programming
46
Programs stored in non-volatile memory, battery backup
Programmed using IEC 61131-3 programming standard
Languages: graphical (e.g., Ladder diagram) and textual
(e.g., Structured Text, Sequential Function Charts)
Ref: http://www.rtaautomation.com/iec61131-3/
http://www.dogwoodvalleypress.com/uploads/excer
pts/03192005214421.pdf
PLC Ladder Logic Diagram
47
Rung 1
Rung 2
Rung 3
Timer, counter,
sequencer etc.
PLC Ladder Logic Example
48
Pilot light PL2 is to be ON when selector switch SS2 is
closed, push-button PB4 is closed and limit switch LS3 is
open.
Series connection
PL2=SS2 (AND) PB4 (AND) LS3
PLC Scan
49
PLC program is scanned continuously while reading the state
of physical inputs and setting the state of the physical outputs.
Scan time for one cycle is between 0-200ms.
Larger scan times might miss transient events.
HMI
50
Human Machine Interface
Operator panel to display and control of system/device
state
Programming software: Example: WinCC from Siemens
SDR
51
Software Defined Radio
Radio communication system that has the traditional hardware
components implemented in software. These include mixers,
filters, amplifiers, modulator/demodulator, etc.
Network Security in CPS: Siemens Approach
52
Use the notion of “cell protection.”
Divide plant network into “automation cells.” Inside
such a cell all devices are able to communicate with
each other.
Access is controlled at the entrance to each cell using
a hardware device
Communication with the outside world is via VPN-
protected channel.
CPS Survivability
53
How can a CPS continue to function above a given
threshold in the presence of attacks?
Despite these techniques, systems continue
to be compromised.
Two stories:
North Pole Toys
Stuxnet
54
North Pole Toys: Basics
55
On-line retailer.
Carries specialized toys generally not found elsewhere.
Process: Toy Assembly, Toy Packaging and Toy Shipping
2011: Replaced the old manufacturing system with new
automated industrial control system.
Files are carried on USB sticks from main server to the
workshop; air gap established
North Pole Toys: Attack
56
Day before Thanksgiving 2011…….
Instead of one toy per box, multiple toys were being placed.
Some empty boxes were being wrapped.
Initial suspicion: Incorrect PLC code; but the code found to be
correct.
Discovery: kAndyKAn3 worm had infected the PLC and the
main office computers.
Stuxnet
57
Uranium and its isotopes
58
Uranium: Naturally occurring radioactive element
Uranium 238: 99.2739 - 99.2752%
Uranium 235: 0.7198 - 0.7202%
Uranium 234: 0.0050 - 0.0059%
Uranium 235
59
Only isotope found in nature in any
appreciable quantities; is fissile, i.e., can be
broken apart by thermal neutrons.
Uranium enrichment: Basis
60
http://www.world-nuclear.org/info/inf28.html
Exploit mass difference
(238 versus 235)
Produce UF6
Uranium enrichment: Zippe Centrifuge
61
geoinfo.nmt.edu/resources/uranium/enrichment.html
Use centrifuges (rapidly revolving
cylinders); pulsating magnetic field
applied to the rotor; bottom is heated;
rotation in vacuum
Heavier U238 atoms down and
outward
Lighter U235 atoms move
towards center and are collected
Banks of centrifuges used to get
the desired amount of U325.
http://en.wikipedia.org/wiki/Zippe-
type_centrifuge
Iranian nuclear enrichment plant
62
Intl Atomic Energy Commission found over 1000-2000
removed from cascades in a few months!!
What happened?
About 8700 centrifuges installed; replacement rate
of 10% per year (approximately 800/yr);
Malware suspicion
63
It was found that the virus was using a zero-day
vulnerability to spread.
June 17, 2010: A computer belonging to an
Iranian a customer of VirusBlokAda was
caught in a reboot loop.
Stuxnet Spread: .LNK file via USB
64
Microsoft informed; the virus named Stuxnet using the file
names found in the virus (.stub and MrxNet.sys)
The .LNK file drops a new copy of Stuxnet onto other
systems
It also drops a rootkit which is used to hide the Stuxnet
routines.
Some driver files used a certificate stolen from a company
in Taiwan.
Stuxnet Spread: Vulnerabilities exploited
65
Print spooler
Windows keyboard file
Task Scheduler file
Static password (Cyber) coded by Siemens
into Step 7 software
Stuxnet..cut short a long story
66
Designed to target Simatic WinCC Step7 software from
Siemens.
A malicious DLL file intercepted commands from Step 7 to PLC
that controlled frequency converters; replaced them by their
own commands; the screen showed only valid commands.
Stuxnet searched for a specific value—2C CB 00 01, 9500H,
7050; codes used in Profibus communication standard.
The two 1-word codes were of frequency converters made
in Finland and Iran.
Stuxnet..finally
67
The STL code sent 47F and 1 (command to start the
frequency converter and set value to 1 ).
Stuxnet strategy:
Stay quiet for 2-weeks; increase the frequency of the converters
to 1,410Hz for 15 minutes; restore them to a normal frequency
of 1,064Hz for for 27 days; drop the frequency down to 2Hz for
50 minutes.
Repeat above.
Control Systems: Basics
68
Secure control: towards survivable cyber physical
systems, Amin et al.,
Linear feedback system
69
x: state vector
A: state matrix
B: Input matrix
C: Output matrix
D: Feedforward matrix
u: Control input
Y: System output
xk+1=Axk+wk
yk=Cxk+vk
w: state noise and
v: measurement noise
vectors
Problem: How to ensure optimal state
estimation under noisy measurements?
Gaussian random noise, zero mean and Q
and R, both >0 as covariance
Linear feedback system: discrete version
70
xk+1=Axk+wk
yk=Cxk+vk
w: state noise and
v: measurement noise
vectors
Problem: How to ensure optimal state estimation under noisy
measurements?
Gaussian random noise, zero mean and Q and R, both >0 as
covariance.
Assumption: (A;C) is detectable and (A;Q) is stabilizable,
the estimation error covariance of the Kalman filter converges to a
unique steady state value from any initial condition.
Linear feedback system: robustness
71
xk+1=Axk+wk
yk=Cxk+vk
w: state noise and
v: measurement noise
vectors
Every raw measurement of y might not arrive at the controller
(estimator), e.g., due to network congestion.
Hence Kalman filters are needed that take into account packet
losses (history of packet losses).
Do we know the characteristic of packet losses when under attack
(QoS parameters)?
Perhaps consider state of the communications network as a
stochastic event and develop new filtering techniques.
Fault tolerant control (FTC)
72
Goal: Maintain stability and acceptable behavior in the presence of
component faults by applying physical and/or analytical
redundancies.
Passive FTC: Consider a fixed set of fault configurations and design
the system to detect and compensate for these.
Example: Control in the presence of sensor malfunction.
Active FTC: Estimate state and fault parameters using
measurements and control data and reconfigure the system using
different control law.
PID Controller
73
P: Proportional
I: Integral:
D: Derivative
e: Error
u: Control input
Y: System output
u = KPe+Kl edt +
ò KD
de
dt
Proportionality constants control
the rise time, overshoot, settling
time, and the steady state error
of system output Y.
Proportional Controller
74
u = KPe
Always a steady state error.
Error decreases with increasing gain.
Tendency to oscillate increases with increasing gain.
PID Controller
75
u= KPe+KD edt
ò
Steady state error vanishes.
Tendency to oscillate increases with increasing KD=1/Ti,
i.e., decreasing Ti.
Tendency to oscillate increases with increasing gain.
PID Controller
76
u = KPe+Kl edt +
ò KD
de
dt
KP and KI selected for oscillatory system.
Damping increases with increasing Td (KD=1/Td).
Derivative term is ineffective when Td is larger than
about 1/6th of the period .
Attacks on Implantable Medical
Devices
77
Halperin et al, 2008 IEEE SS&P, pp129 -142
CPS: Medical Device Attack
78
Implanted device
Parameter/algorithm
update computer
Pumps can be hijacked by hacking radio
signals.
Then the device could be switched off
Dangerous dose of medicine could be
delivered
Security alerts could be disabled
175kHz
CPS: Medical Device Attack Procedure
79
1. Capture RF transmission [175kHz].
2. Oscilloscope allowed identification of transmissions
from ICD to ICD Programmer.
3. RF traces analyzed using Matlab and GNU Radio
toolchain to obtain symbols and bits.
4. This led to the discovery of the ICD –programmer
communications protocol.
Reverse engineer the transmissions:
CPS: Medical Device Attack Procedure
80
1. Built an eavesdropper using GNU radio library.
2. Establish transaction timeline.
3. Decoding not needed; meaning of transactions were
deciphered by observing the order in which the
programmer acquired the information from the ICD.
Eavesdropping with a software radio:
CPS: Medical Device Attacks
81
Halperin et al, 2008 IEEE SS&P, pp129 -142
ICD-Programmer Communications:
CPS: Medical Device: Attacks
82
Halperin et al, 2008 IEEE SS&P, pp129 -142
Using Universal Software Radio Peripheral and
BasicTX board, several attacks were possible.
Replay attack: ICT set to a known state, replay the
desired transmission and then evaluate the ICD state.
.
Air gap of a few centimeters..
CPS: Medical Device: Attacks
83
Halperin et al, 2008 IEEE SS&P, pp129 -142
Triggering ICD identification: Auto-identification trace
was replayed leading to identical responses from the
ICD.
Disclosing patient data: Auto-identification followed
by interrogation command makes the ICD respond
with patient name, diagnosis, and other details.
CPS: Medical Device: Attacks
84
Halperin et al, 2008 IEEE SS&P, pp129 -142
Disclosing cardiac data: Replaying the start of the
interrogation command sequence causes the ICD to
transmit cardiac data.
Changing therapies: Therapies could be turned off by
replaying captures where the programmer turns off
the therapies. Once done, the ICD does not respond
to dangerous cardiac conditions.
Securing Medical Devices: Encryption?
85
Halperin et al, 2008 IEEE SS&P, pp129 -142
Should the communications between the programmer and
the ICD be encrypted?
Securing Medical Devices: Zero power approaches
86
Halperin et al, 2008 IEEE SS&P, pp129 -142
Zero-power notification: Alert patient when security-
sensitive event occurs; do so by harvesting induced RF to
wirelessly power a piezo-element [built on WISP: Wireless
Identification Sensing Platform]
Zero-power authentication: Harvest RF energy to power
cryptographically strong protocol to authenticate requests
from the programmer. [Challenge-response protocol]
Sensible key-exchange: Combine ZPN and ZPA for vibration-
based key distribution.
CPS: Medical Device: Protocol
87
Halperin et al, 2008 IEEE SS&P, pp129 -142
KM: master key (Programmer)
I: IMD serial number
K=f(KM, I); IMD key
f: pseudorandom function
RC5: Block cipher
GPIO: General Purpose IO port
Nonce: Fixed in this implementation
CPS: Medical Device: Protocol
88
Halperin et al, 2008 IEEE SS&P, pp129 -142
Programmer WISP
Authenticate
I(dentity) and N(once)
Compute
f(KM,I)
R=RC5(K,N)
1
4
3
2
5
R’=RC5(K,N)
IMD
(R’==R)=>
GPIO high
6
CPS: Medical Device: Key management
89
Halperin et al, 2008 IEEE SS&P, pp129 -142
Open problem for implantable devices
CPS: Medical Device Attack: Results
90
Halperin et al, 2008 IEEE SS&P, pp129 -142
Deception Attacks on Irrigation
Systems
91
On Cyber Security for Networked Control Systems, Amin, Saurabh, Ph.D.,
UNIVERSITY OF CALIFORNIA, BERKELEY, 2011, 198 pages; 3473864
The Gignac irrigation canal
92
SCADA in irrigation: Physical attacks
93
Solar panels stolen affecting radio communications
Damaged monitoring bridge that hosts gate controllers
Installing additional pumps
SCADA in irrigation: Other incidents
94
Tehama colusa canal, Willows, CA, USA
Maroochy water breach, near Brisbane, Australia
Harrisburg water filtering plant, Harrisburg, PA, USA
SCADA in irrigation
95
SCADA
level
velocity
Hydraulic
structures
policies
Control
Signals (radio)
Motorized gates and
controllers
Irrigation canal model
96
m: Number of canal pools
T, X: Cross section width and length of each pool (m)
V: Average cross-sectional velocity (m/s)
Y: Water depth
P: Offtake; lateral outflow (m2/s)
Ui-1, Ui: Opening of upstream and downstream gates
Gates
Irrigation canal: Shallow Water Eqns
97
g: gravity (m/s2)
Sf : friction slope
Sb : bed slope (m/m)
Irrigation canal: Control actions
98
Ui-1 and Ui: can be changed by controlling the actuators:
Y: Known upstream and downstream
Yi(0, t) and Yi(X,t): known measurements
Upstream and downstream discharge:
Irrigation canal: Boundary conditions
99
Upstream and downstream discharge:
Intermediate gates discharge:
Irrigation canal: Feedback actions
100
Change in gate openings ui(t)
Boundary control actions are decentralized and local to
each canal pool; computed using local water level
measurements.
Irrigation canal: Water withdrawal attack
101
Ji: Number of offtakes from pool i
Lateral flow along the length of the ith pool:
Indicator for jth offtake in ith canal:
Total lateral withdrawal from ith canal:
Irrigation canal: Water withdrawal attack
102
Adversary can affect withdrawal from one or more of
the Ji offtakes in canal i.
Water is withdrawn by discretely opening and closing
the offtake gates.
Thus, the offtake withdrawal vector switches
between different modes Q={1, 2,….N}.
r(t)
Irrigation canal: sensor deception attack
103
Adversary can affect sensor readings for upstream Yi(0,
t) and Yi(X,t) and gate opening Ui(t)
This leads to a transformed water level and gate
openings.
Irrigation canal: Experiments
104
Irrigation canal: Experiments
105
CPS Design Principles
106
Aspects to consider
Adversary models: Restrict the scope; but overly restrictive
assumptions will likely limit their aplicability e.g., in DoS attacks.
Trust models: Trust in human users and devices, e.g., sensors and
actuators
“Under attack” behavior: Detection and graceful degradation.
Independence in component design: Redundant authentication
mechanisms that are indepenent of each other
Potential research directions and
educational needs
108
CPS Gaps?
Study the overall design of selected critical CPS
infrastructures and determine security gaps and
their impact on functionality and safety of
Singapore population.
109
CPS Modeling: Network models
What is the state
space of reach node
(a subsystem)?
What are the
constraints across
node-states?
If and how could an
attacker violate the
constraints?
110
CPS [Supply chain] Monitoring
Are the existing intrusion detection tools
adequate for monitoring attacks across a
supply chain?
How could nodes in a supply chain-- with Singapore
as a node-- be compromised?
What monitoring tools are need to check the “health” of a
supply chain given the possibility of an network attack?
111
CPS Attack scenarios
How to defend against any such attacks?
Are there attacks different from the existing ones
that could sabotage a supply chain or any CPS?
112
CPS Control Robustness
How to design controllers that could continue to
function in the presence of deception and denial of
service attacks?
113
CPS Access Control
Are RBAC and TRBAC models for access control adequate for
large distributed CPS and global supply chains?
114
CPS: Theoretical Foundations
Control theoretic [e.g., work at Berkeley]
115
Game theoretic [e.g., work at UT Arlington]
Verification and testing techniques[e.g., work at Purdue]
Specification-based [e.g., work at UIUC]
CPS: Educational needs
Traditional IT security:
Cryptography, networks, OS, and other CS subjects
116
CPS security:
Interdisciplinary education needed;
Background in controls, game theory, industrial automation;
Domain background
Most importantly:
Ability to acquire the necessary background through self
learning
Summary
What is a CPS?
117
What research directions Singapore ought to consider to
ensure the functionality of its CPS and consequently the
safety of its people?
Why existing techniques for the detection and prevention of
information-related attacks might be inadequate in CPS?
References [Sample]
Secure Control: Towards Survivable Cyber-Physical Systems. Alvaro A. Ca ́rdenas
Saurabh Amin Shankar Sastry, The 28th International Conference on Distributed
Computing Systems Workshop, IEEE 2008.
118
Common Cybersecurity Vulnerabilities in Industrial Control Systems. US
Department of Homeland Security. May 2011.
Cyber-Physical Systems Security for Smart Grid. White Paper. Manimaran
Govindarasu, Adam Hann, and Peter Sauer. February 2012.
Improving the Security and Privacy of Implantable Medical Devices, William H.
Maisel and Tadayoshi Kohno, New England Journal of Medicine 362(13):1164-
1166, April 2010.
Guide to Industrial Control Systems (ICS) Security. Keith Stouffer, Joe Falco,
and Karen Scarfone. NIST. 800-02. June 2011.

More Related Content

Similar to CPSSecurityBITSWorkshopDec15.2012 (1).pptx

Power system automation
Power system automationPower system automation
Power system automationAbbas Ali
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart gridsHamza AlBzoor
 
SCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdfSCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdfebrahimbadushata00
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...Mark Underwood
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesAkhil Vijayakumar
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...lvskumar1
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...cscpconf
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
 

Similar to CPSSecurityBITSWorkshopDec15.2012 (1).pptx (20)

Power system automation
Power system automationPower system automation
Power system automation
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
SCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdfSCADA forensic tools open source. What are they What they doSo.pdf
SCADA forensic tools open source. What are they What they doSo.pdf
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Power Grid Cybersecurity
Power Grid CybersecurityPower Grid Cybersecurity
Power Grid Cybersecurity
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
Smart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issuesSmart grid forensic science, application and challenges and open issues
Smart grid forensic science, application and challenges and open issues
 
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
A_Novel_Standalone_Implementation_of_MDNN_Controller_for_DC-DC_Converter_Resi...
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

CPSSecurityBITSWorkshopDec15.2012 (1).pptx

  • 1. Cyber Physical Systems: Security and Safety Singapore University of Technology and Design Aditya P Mathur December 15, 2012 International Workshop on Information Security (IWIS-2012)
  • 2. Questions of interest 2 What is a CPS? What are the security issues in CPS and how do they differ from those in traditional information systems? To what extent can a CPS be secured against cyber crime? Are there some fundamental design principles that ought to be used when designing or upgrading a CPS? What are the curricular ramifications of CPS security?
  • 3. Coverage 3 CPS examples and concerns, components, abstraction, incidents Traditional versus CPS security Industrial control systems Two real-life incidents: Toys and Iran Control systems: basics Case studies: Medical devices and Irrigation Systems CPS: design principles, research and educational needs
  • 5. Shipping 5 Several countries and cities in the world have some of the world's busiest ports and large transshipment hubs. For example, PSA Singapore Terminals are connected by 200 shipping lines to 600 ports in 123 countries, with daily sailings to every major port of call in the world.
  • 6. Healthcare 6 Singapore offers Asia's best healthcare system, and its standard of medical practice ranks among the best in the world. The Joint Commission International (JCI) has accredited 11 hospitals and three medical centers in Singapore.
  • 7. Infocomm 7 Singapore today ranks as the second most network- ready country in the world and the first in Asia, according to the World Economic Forum's Global Information Technology Report 2010/2011.
  • 8. Energy 8 “Today, Singapore is the undisputed oil hub in Asia and is one of the world’s top three export refining centers....”
  • 9. Smart Grid - Overview What is a Smart Grid? • Smart Grid : Overlay electrical grid with sensors (phasor monitoring units - PMUs) and control systems (SCADA) to enable: – reliable and secure network monitoring, load balancing, energy efficiency via smart meters, and integration of new energy sources
  • 10. Smart Grid – Smart Metering
  • 13. Privacy is not Secrecy Privacy is not Secrecy! • Privacy: the ability to prevent unwanted transfer of information (via inference or correlation) when legitimate transfers happen. • But privacy is not secrecy! • Privacy problem: disclosing data provides informational utility while also enabling potential loss of privacy – Every user is potentially an adversary – Encryption is not a solution! ?= Eve
  • 14. Privacy versus Secrecy Privacy vs. Secrecy! • Privacy: the ability to prevent unwanted transfer of information (via inference or correlation) when legitimate transfers happen. • But privacy is not secrecy! • Secrecy Problem: Protocols and primitives clearly distinguish a malicious adversary vs. intended user and secret vs. non-secret data. – Encryption may be a solution.
  • 15. Possible Solutions • Robust Smart Metering Design with privacy constraints • Utility-Privacy Tradeoff Design • Privacy Invasion Detection/Prevention • Data masking • Data Anonymisation
  • 17. CPS Vulnerability 17 Are your energy, healthcare, water, shipping, transportation systems vulnerable to network attacks? What, if any, are the vulnerabilities in such systems? When exploited, how might such vulnerabilities affect people?
  • 18. CPS Control systems 18 Are the control systems in your large and critical CPSs systems robust enough to withstand deception attacks? Are these control systems programmed to withstand denial of service attacks?
  • 19. Surviving from Physical attacks • What happens if we lose part, or even most of the computing systems? • Will redundancy alone solve the problem? • How to measure and quantify of resilience of current systems? • How to ensure high availability of CPS? 19
  • 20. Defending Against Device Capture Attack • Physical devices in CPS systems may be captured, compromised and released back by adversaries. • How to identify and ameliorate the system damage with trusted hardware but potentially untrusted/modified software? 20
  • 21. Real-Time Security in CPS • CPS often requires real- time responses to physical processes • Little Study on how attacks affect the real- time properties of CPS • How to guarantee real- time requirements under attack? 21
  • 22. Concurrency in CPS • CPS is concurrent in nature, running both cyber and physical processes • Little research on handling large-scale concurrent systems 22
  • 23. Collaboration and Isolation • CPS needs to effectively isolate attackers while maintaining collaborations among different, distributed system components • How to avoid cascading failures while minimizing system performance degradation? 23
  • 24. Cyber Physical System: Components 24
  • 27. CPS Other examples 27 Pacemaker ICD (Implantable Cardiovascular Defibrillator) Insulin pump Neuro-stimulators
  • 28. Cyber Physical Systems: Abstraction 28
  • 30. CPS: Systems View 30 Physical System Sensor Control System Actuator y u: input x: state Estimation and control : Network
  • 31. CPS Network-based Attacks 31 Physical System Sensor Control System Actuator y’ not y: Sensor compromised u’ not u controller compromised Network jammed
  • 33. Enhancement of existing approaches 33 How deception and DoS attacks affect application layer performance (e.g., estimation and control)? Intrusion detection and deception attacks in control systems? What if a human is not in the loop for intrusion detection?
  • 35. CPS incident databases 35 BCIT Industry security incident databaseTOFINO http://www.tofinosecurity.com/ Cyber incidents involving control systems, Robert Turk, October 2005, Idaho National Laboratory, INL/EXT-05-00671 Wurldtech: http://www.wurldtech.com/ http://www.tofinosecurity.com/blog/2012-scada-security- predictions-how-did-eric-byres-do
  • 36. Sample CPS incidents 36 2010: Stuxnet [http://www.tofinosecurity.com/stuxnet- central] Nov 2012: kAndyKAn3 worm attacks North Pole Toys Over 500 SCADA vulnerabilities found in 2011 2010: Night Dragon, Duqu, Nitro
  • 37. CPS incident report statistics 37 Empirical Analysis of publicly disclosed ICS vulnerabilities since 2001” by Sean McBride
  • 38. CPS incident (more) statistics 38 42% of all incidences were conducted by means of mobile malware 61% of the perpetrators originated from external sources 43% of perpetrators were malware authors
  • 39. Traditional versus CPS security 39
  • 40. Traditional 40 Confidentiality: Ability to maintain secrecy from unauthorized users. Integrity: Trustworthiness of data received; lack of this leads to deception. Availability: Ability of the system being accessible
  • 41. CPS 41 Timeliness: responsiveness, freshness of data Ref: A Taxonomy of Cyber Attacks on SCADA Systems, Zhu et al., UC Berkeley. Availability: unexpected outages Integrity: genuine data displayed and received by the controller Confidentiality: Information regarding SCADA not available to any unauthorized individual Graceful degradation
  • 43. SCADA 43 Supervisory Control and Data Acquisition System It is an industrial control system that consists of RTUs, PLCs, and HMIs to control an industrial process. Use: Manufacturing, power generation, fabrication, oil and gas pipelines, etc.
  • 44. RTU 44 Microprocessor controlled Remote Terminal/Telemetry Unit Interface between physical objects and a SCADA. Transmits telemetry data to SCADA. Example: water quality. Siemens LC150 Pump Control Telemetry Unit
  • 45. PLC 45 Programmable Logic Controller A computer to control the operation of electro- mechanical devices such as pumps, motors, switches Hard real-time system Programs stored in non-volatile memory, battery backup Programmed using State Logic, Basic, C: IEC 61131-3 programming standard Siemens S7-mEC embedded controller
  • 46. PLC Programming 46 Programs stored in non-volatile memory, battery backup Programmed using IEC 61131-3 programming standard Languages: graphical (e.g., Ladder diagram) and textual (e.g., Structured Text, Sequential Function Charts) Ref: http://www.rtaautomation.com/iec61131-3/ http://www.dogwoodvalleypress.com/uploads/excer pts/03192005214421.pdf
  • 47. PLC Ladder Logic Diagram 47 Rung 1 Rung 2 Rung 3 Timer, counter, sequencer etc.
  • 48. PLC Ladder Logic Example 48 Pilot light PL2 is to be ON when selector switch SS2 is closed, push-button PB4 is closed and limit switch LS3 is open. Series connection PL2=SS2 (AND) PB4 (AND) LS3
  • 49. PLC Scan 49 PLC program is scanned continuously while reading the state of physical inputs and setting the state of the physical outputs. Scan time for one cycle is between 0-200ms. Larger scan times might miss transient events.
  • 50. HMI 50 Human Machine Interface Operator panel to display and control of system/device state Programming software: Example: WinCC from Siemens
  • 51. SDR 51 Software Defined Radio Radio communication system that has the traditional hardware components implemented in software. These include mixers, filters, amplifiers, modulator/demodulator, etc.
  • 52. Network Security in CPS: Siemens Approach 52 Use the notion of “cell protection.” Divide plant network into “automation cells.” Inside such a cell all devices are able to communicate with each other. Access is controlled at the entrance to each cell using a hardware device Communication with the outside world is via VPN- protected channel.
  • 53. CPS Survivability 53 How can a CPS continue to function above a given threshold in the presence of attacks? Despite these techniques, systems continue to be compromised.
  • 54. Two stories: North Pole Toys Stuxnet 54
  • 55. North Pole Toys: Basics 55 On-line retailer. Carries specialized toys generally not found elsewhere. Process: Toy Assembly, Toy Packaging and Toy Shipping 2011: Replaced the old manufacturing system with new automated industrial control system. Files are carried on USB sticks from main server to the workshop; air gap established
  • 56. North Pole Toys: Attack 56 Day before Thanksgiving 2011……. Instead of one toy per box, multiple toys were being placed. Some empty boxes were being wrapped. Initial suspicion: Incorrect PLC code; but the code found to be correct. Discovery: kAndyKAn3 worm had infected the PLC and the main office computers.
  • 58. Uranium and its isotopes 58 Uranium: Naturally occurring radioactive element Uranium 238: 99.2739 - 99.2752% Uranium 235: 0.7198 - 0.7202% Uranium 234: 0.0050 - 0.0059%
  • 59. Uranium 235 59 Only isotope found in nature in any appreciable quantities; is fissile, i.e., can be broken apart by thermal neutrons.
  • 61. Uranium enrichment: Zippe Centrifuge 61 geoinfo.nmt.edu/resources/uranium/enrichment.html Use centrifuges (rapidly revolving cylinders); pulsating magnetic field applied to the rotor; bottom is heated; rotation in vacuum Heavier U238 atoms down and outward Lighter U235 atoms move towards center and are collected Banks of centrifuges used to get the desired amount of U325. http://en.wikipedia.org/wiki/Zippe- type_centrifuge
  • 62. Iranian nuclear enrichment plant 62 Intl Atomic Energy Commission found over 1000-2000 removed from cascades in a few months!! What happened? About 8700 centrifuges installed; replacement rate of 10% per year (approximately 800/yr);
  • 63. Malware suspicion 63 It was found that the virus was using a zero-day vulnerability to spread. June 17, 2010: A computer belonging to an Iranian a customer of VirusBlokAda was caught in a reboot loop.
  • 64. Stuxnet Spread: .LNK file via USB 64 Microsoft informed; the virus named Stuxnet using the file names found in the virus (.stub and MrxNet.sys) The .LNK file drops a new copy of Stuxnet onto other systems It also drops a rootkit which is used to hide the Stuxnet routines. Some driver files used a certificate stolen from a company in Taiwan.
  • 65. Stuxnet Spread: Vulnerabilities exploited 65 Print spooler Windows keyboard file Task Scheduler file Static password (Cyber) coded by Siemens into Step 7 software
  • 66. Stuxnet..cut short a long story 66 Designed to target Simatic WinCC Step7 software from Siemens. A malicious DLL file intercepted commands from Step 7 to PLC that controlled frequency converters; replaced them by their own commands; the screen showed only valid commands. Stuxnet searched for a specific value—2C CB 00 01, 9500H, 7050; codes used in Profibus communication standard. The two 1-word codes were of frequency converters made in Finland and Iran.
  • 67. Stuxnet..finally 67 The STL code sent 47F and 1 (command to start the frequency converter and set value to 1 ). Stuxnet strategy: Stay quiet for 2-weeks; increase the frequency of the converters to 1,410Hz for 15 minutes; restore them to a normal frequency of 1,064Hz for for 27 days; drop the frequency down to 2Hz for 50 minutes. Repeat above.
  • 68. Control Systems: Basics 68 Secure control: towards survivable cyber physical systems, Amin et al.,
  • 69. Linear feedback system 69 x: state vector A: state matrix B: Input matrix C: Output matrix D: Feedforward matrix u: Control input Y: System output xk+1=Axk+wk yk=Cxk+vk w: state noise and v: measurement noise vectors Problem: How to ensure optimal state estimation under noisy measurements? Gaussian random noise, zero mean and Q and R, both >0 as covariance
  • 70. Linear feedback system: discrete version 70 xk+1=Axk+wk yk=Cxk+vk w: state noise and v: measurement noise vectors Problem: How to ensure optimal state estimation under noisy measurements? Gaussian random noise, zero mean and Q and R, both >0 as covariance. Assumption: (A;C) is detectable and (A;Q) is stabilizable, the estimation error covariance of the Kalman filter converges to a unique steady state value from any initial condition.
  • 71. Linear feedback system: robustness 71 xk+1=Axk+wk yk=Cxk+vk w: state noise and v: measurement noise vectors Every raw measurement of y might not arrive at the controller (estimator), e.g., due to network congestion. Hence Kalman filters are needed that take into account packet losses (history of packet losses). Do we know the characteristic of packet losses when under attack (QoS parameters)? Perhaps consider state of the communications network as a stochastic event and develop new filtering techniques.
  • 72. Fault tolerant control (FTC) 72 Goal: Maintain stability and acceptable behavior in the presence of component faults by applying physical and/or analytical redundancies. Passive FTC: Consider a fixed set of fault configurations and design the system to detect and compensate for these. Example: Control in the presence of sensor malfunction. Active FTC: Estimate state and fault parameters using measurements and control data and reconfigure the system using different control law.
  • 73. PID Controller 73 P: Proportional I: Integral: D: Derivative e: Error u: Control input Y: System output u = KPe+Kl edt + ò KD de dt Proportionality constants control the rise time, overshoot, settling time, and the steady state error of system output Y.
  • 74. Proportional Controller 74 u = KPe Always a steady state error. Error decreases with increasing gain. Tendency to oscillate increases with increasing gain.
  • 75. PID Controller 75 u= KPe+KD edt ò Steady state error vanishes. Tendency to oscillate increases with increasing KD=1/Ti, i.e., decreasing Ti. Tendency to oscillate increases with increasing gain.
  • 76. PID Controller 76 u = KPe+Kl edt + ò KD de dt KP and KI selected for oscillatory system. Damping increases with increasing Td (KD=1/Td). Derivative term is ineffective when Td is larger than about 1/6th of the period .
  • 77. Attacks on Implantable Medical Devices 77 Halperin et al, 2008 IEEE SS&P, pp129 -142
  • 78. CPS: Medical Device Attack 78 Implanted device Parameter/algorithm update computer Pumps can be hijacked by hacking radio signals. Then the device could be switched off Dangerous dose of medicine could be delivered Security alerts could be disabled 175kHz
  • 79. CPS: Medical Device Attack Procedure 79 1. Capture RF transmission [175kHz]. 2. Oscilloscope allowed identification of transmissions from ICD to ICD Programmer. 3. RF traces analyzed using Matlab and GNU Radio toolchain to obtain symbols and bits. 4. This led to the discovery of the ICD –programmer communications protocol. Reverse engineer the transmissions:
  • 80. CPS: Medical Device Attack Procedure 80 1. Built an eavesdropper using GNU radio library. 2. Establish transaction timeline. 3. Decoding not needed; meaning of transactions were deciphered by observing the order in which the programmer acquired the information from the ICD. Eavesdropping with a software radio:
  • 81. CPS: Medical Device Attacks 81 Halperin et al, 2008 IEEE SS&P, pp129 -142 ICD-Programmer Communications:
  • 82. CPS: Medical Device: Attacks 82 Halperin et al, 2008 IEEE SS&P, pp129 -142 Using Universal Software Radio Peripheral and BasicTX board, several attacks were possible. Replay attack: ICT set to a known state, replay the desired transmission and then evaluate the ICD state. . Air gap of a few centimeters..
  • 83. CPS: Medical Device: Attacks 83 Halperin et al, 2008 IEEE SS&P, pp129 -142 Triggering ICD identification: Auto-identification trace was replayed leading to identical responses from the ICD. Disclosing patient data: Auto-identification followed by interrogation command makes the ICD respond with patient name, diagnosis, and other details.
  • 84. CPS: Medical Device: Attacks 84 Halperin et al, 2008 IEEE SS&P, pp129 -142 Disclosing cardiac data: Replaying the start of the interrogation command sequence causes the ICD to transmit cardiac data. Changing therapies: Therapies could be turned off by replaying captures where the programmer turns off the therapies. Once done, the ICD does not respond to dangerous cardiac conditions.
  • 85. Securing Medical Devices: Encryption? 85 Halperin et al, 2008 IEEE SS&P, pp129 -142 Should the communications between the programmer and the ICD be encrypted?
  • 86. Securing Medical Devices: Zero power approaches 86 Halperin et al, 2008 IEEE SS&P, pp129 -142 Zero-power notification: Alert patient when security- sensitive event occurs; do so by harvesting induced RF to wirelessly power a piezo-element [built on WISP: Wireless Identification Sensing Platform] Zero-power authentication: Harvest RF energy to power cryptographically strong protocol to authenticate requests from the programmer. [Challenge-response protocol] Sensible key-exchange: Combine ZPN and ZPA for vibration- based key distribution.
  • 87. CPS: Medical Device: Protocol 87 Halperin et al, 2008 IEEE SS&P, pp129 -142 KM: master key (Programmer) I: IMD serial number K=f(KM, I); IMD key f: pseudorandom function RC5: Block cipher GPIO: General Purpose IO port Nonce: Fixed in this implementation
  • 88. CPS: Medical Device: Protocol 88 Halperin et al, 2008 IEEE SS&P, pp129 -142 Programmer WISP Authenticate I(dentity) and N(once) Compute f(KM,I) R=RC5(K,N) 1 4 3 2 5 R’=RC5(K,N) IMD (R’==R)=> GPIO high 6
  • 89. CPS: Medical Device: Key management 89 Halperin et al, 2008 IEEE SS&P, pp129 -142 Open problem for implantable devices
  • 90. CPS: Medical Device Attack: Results 90 Halperin et al, 2008 IEEE SS&P, pp129 -142
  • 91. Deception Attacks on Irrigation Systems 91 On Cyber Security for Networked Control Systems, Amin, Saurabh, Ph.D., UNIVERSITY OF CALIFORNIA, BERKELEY, 2011, 198 pages; 3473864
  • 93. SCADA in irrigation: Physical attacks 93 Solar panels stolen affecting radio communications Damaged monitoring bridge that hosts gate controllers Installing additional pumps
  • 94. SCADA in irrigation: Other incidents 94 Tehama colusa canal, Willows, CA, USA Maroochy water breach, near Brisbane, Australia Harrisburg water filtering plant, Harrisburg, PA, USA
  • 96. Irrigation canal model 96 m: Number of canal pools T, X: Cross section width and length of each pool (m) V: Average cross-sectional velocity (m/s) Y: Water depth P: Offtake; lateral outflow (m2/s) Ui-1, Ui: Opening of upstream and downstream gates Gates
  • 97. Irrigation canal: Shallow Water Eqns 97 g: gravity (m/s2) Sf : friction slope Sb : bed slope (m/m)
  • 98. Irrigation canal: Control actions 98 Ui-1 and Ui: can be changed by controlling the actuators: Y: Known upstream and downstream Yi(0, t) and Yi(X,t): known measurements Upstream and downstream discharge:
  • 99. Irrigation canal: Boundary conditions 99 Upstream and downstream discharge: Intermediate gates discharge:
  • 100. Irrigation canal: Feedback actions 100 Change in gate openings ui(t) Boundary control actions are decentralized and local to each canal pool; computed using local water level measurements.
  • 101. Irrigation canal: Water withdrawal attack 101 Ji: Number of offtakes from pool i Lateral flow along the length of the ith pool: Indicator for jth offtake in ith canal: Total lateral withdrawal from ith canal:
  • 102. Irrigation canal: Water withdrawal attack 102 Adversary can affect withdrawal from one or more of the Ji offtakes in canal i. Water is withdrawn by discretely opening and closing the offtake gates. Thus, the offtake withdrawal vector switches between different modes Q={1, 2,….N}. r(t)
  • 103. Irrigation canal: sensor deception attack 103 Adversary can affect sensor readings for upstream Yi(0, t) and Yi(X,t) and gate opening Ui(t) This leads to a transformed water level and gate openings.
  • 107. Aspects to consider Adversary models: Restrict the scope; but overly restrictive assumptions will likely limit their aplicability e.g., in DoS attacks. Trust models: Trust in human users and devices, e.g., sensors and actuators “Under attack” behavior: Detection and graceful degradation. Independence in component design: Redundant authentication mechanisms that are indepenent of each other
  • 108. Potential research directions and educational needs 108
  • 109. CPS Gaps? Study the overall design of selected critical CPS infrastructures and determine security gaps and their impact on functionality and safety of Singapore population. 109
  • 110. CPS Modeling: Network models What is the state space of reach node (a subsystem)? What are the constraints across node-states? If and how could an attacker violate the constraints? 110
  • 111. CPS [Supply chain] Monitoring Are the existing intrusion detection tools adequate for monitoring attacks across a supply chain? How could nodes in a supply chain-- with Singapore as a node-- be compromised? What monitoring tools are need to check the “health” of a supply chain given the possibility of an network attack? 111
  • 112. CPS Attack scenarios How to defend against any such attacks? Are there attacks different from the existing ones that could sabotage a supply chain or any CPS? 112
  • 113. CPS Control Robustness How to design controllers that could continue to function in the presence of deception and denial of service attacks? 113
  • 114. CPS Access Control Are RBAC and TRBAC models for access control adequate for large distributed CPS and global supply chains? 114
  • 115. CPS: Theoretical Foundations Control theoretic [e.g., work at Berkeley] 115 Game theoretic [e.g., work at UT Arlington] Verification and testing techniques[e.g., work at Purdue] Specification-based [e.g., work at UIUC]
  • 116. CPS: Educational needs Traditional IT security: Cryptography, networks, OS, and other CS subjects 116 CPS security: Interdisciplinary education needed; Background in controls, game theory, industrial automation; Domain background Most importantly: Ability to acquire the necessary background through self learning
  • 117. Summary What is a CPS? 117 What research directions Singapore ought to consider to ensure the functionality of its CPS and consequently the safety of its people? Why existing techniques for the detection and prevention of information-related attacks might be inadequate in CPS?
  • 118. References [Sample] Secure Control: Towards Survivable Cyber-Physical Systems. Alvaro A. Ca ́rdenas Saurabh Amin Shankar Sastry, The 28th International Conference on Distributed Computing Systems Workshop, IEEE 2008. 118 Common Cybersecurity Vulnerabilities in Industrial Control Systems. US Department of Homeland Security. May 2011. Cyber-Physical Systems Security for Smart Grid. White Paper. Manimaran Govindarasu, Adam Hann, and Peter Sauer. February 2012. Improving the Security and Privacy of Implantable Medical Devices, William H. Maisel and Tadayoshi Kohno, New England Journal of Medicine 362(13):1164- 1166, April 2010. Guide to Industrial Control Systems (ICS) Security. Keith Stouffer, Joe Falco, and Karen Scarfone. NIST. 800-02. June 2011.

Editor's Notes

  1. http://www.istockphoto.com/stock-illustration-17912107-game-world.php?st=d56805a (temperature 1100K)