首页> 外文会议>Critical Infrastructure Protection II >COMBATING MEMORY CORRUPTION ATTACKS ON SCADA DEVICES
【24h】

COMBATING MEMORY CORRUPTION ATTACKS ON SCADA DEVICES

机译:在SCADA设备上打击内存损坏攻击

获取原文
获取原文并翻译 | 示例

摘要

Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
机译:SCADA设备上的内存损坏攻击可能会严重破坏控制系统及其运行的工业流程。但是,尽管存在许多内存损坏漏洞,但很少提出(如果有的话)用于解决该漏洞或用于抵抗内存损坏攻击的技术。本文介绍了一种通过在受保护进程中的潜在敌对数据与安全数据之间执行逻辑边界来防御内存破坏攻击的技术。该技术使用随机密钥加密所有输入数据。加密的数据存储在主存储器中,并在CPU处理之前根据最小特权原则解密。防御技术会影响攻击者破坏控制数据和纯数据的精度,防止代码注入和电弧注入攻击,并缓解缓解技术无法比拟的问题。一项涉及流行的Modbus协议的实验评估证明了防御技术的可行性和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号