DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Emerging Techniques for Field Device Security

Abstract

Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a system will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.

Authors:
 [1];  [2];  [2];  [2]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bechtel Corp. (United States)
  2. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandia National Lab. (SNL-CA), Livermore, CA (United States)
Sponsoring Org.:
USDOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER), Infrastructure Security and Energy Restoration (ISER)
OSTI Identifier:
1183104
Report Number(s):
SAND-2014-17095J
Journal ID: ISSN 1540-7993; 537058
Grant/Contract Number:  
AC04-94AL85000
Resource Type:
Accepted Manuscript
Journal Name:
IEEE Security & Privacy
Additional Journal Information:
Journal Volume: 12; Journal Issue: 6; Journal ID: ISSN 1540-7993
Publisher:
IEEE
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Schwartz, Moses, Mulder, John, Chavez, Adrian R., and Allan, Benjamin A. Emerging Techniques for Field Device Security. United States: N. p., 2014. Web. doi:10.1109/MSP.2014.114.
Schwartz, Moses, Mulder, John, Chavez, Adrian R., & Allan, Benjamin A. Emerging Techniques for Field Device Security. United States. https://doi.org/10.1109/MSP.2014.114
Schwartz, Moses, Mulder, John, Chavez, Adrian R., and Allan, Benjamin A. Sat . "Emerging Techniques for Field Device Security". United States. https://doi.org/10.1109/MSP.2014.114. https://www.osti.gov/servlets/purl/1183104.
@article{osti_1183104,
title = {Emerging Techniques for Field Device Security},
author = {Schwartz, Moses and Mulder, John and Chavez, Adrian R. and Allan, Benjamin A.},
abstractNote = {Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a system will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.},
doi = {10.1109/MSP.2014.114},
journal = {IEEE Security & Privacy},
number = 6,
volume = 12,
place = {United States},
year = {Sat Nov 01 00:00:00 EDT 2014},
month = {Sat Nov 01 00:00:00 EDT 2014}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record

Citation Metrics:
Cited by: 6 works
Citation information provided by
Web of Science

Save / Share:

Works referencing / citing this record:

Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks
conference, December 2017

  • Cheng, Long; Tian, Ke; Yao, Danfeng (Daphne)
  • ACSAC 2017: 2017 Annual Computer Security Applications Conference, Proceedings of the 33rd Annual Computer Security Applications Conference
  • DOI: 10.1145/3134600.3134640

Anomaly Detection as a Service: Challenges, Advances, and Opportunities
journal, October 2017

  • Yao, Danfeng (Daphne); Shu, Xiaokui; Cheng, Long
  • Synthesis Lectures on Information Security, Privacy, and Trust, Vol. 9, Issue 3
  • DOI: 10.2200/s00800ed1v01y201709spt022