A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers
Abstract
:1. Introduction
1.1. Motivation
- -
- An attacker aims at modifying PLC codes, i.e., the control logic programs that PLCs run. This scenario represents a typical control logic injection attack.
- -
- An attacker manipulates specific input data to exploit the flaws of a PLC program. Such a scenario is known as a control logic manipulation attack.
- -
- An attacker corrupts the PLC’s memory in order to sabotage the execution process of a control logic. This scenario is called a control logic corruption attack.
1.2. Scope of the Article
- -
- The study investigates control logic injection attacks. Our focus is on attacks that targeted the PLC’s program by modifying the program payload, injecting malicious data to trigger program design flaws, or corrupting the PLC’s memory to confuse the execution of the control logic. To achieve a realistic survey, we exclude in this article all the works that are not tested on real hardware and industrial settings.
- -
- The study plays an impactful role in the research community. We discuss top cited papers in this area, showing the very new vulnerabilities that the authors of these papers exploited in order to modify the control logic of different types of PLCs. To be more accurate, we exclude all the works that have less than 20 citations unless they present novel attack approaches, or reveal new vulnerabilities.
- -
- The study discovers a new direction for future research. We take into consideration the papers that suggest new paths for further research or potential security directions to be covered.
1.3. Contributions
- -
- To the best of our knowledge, this is the first survey paper to provide a comprehensive study of different control logic attack methods against PLCs. We hope that our article can trigger more research activities in this domain.
- -
- We survey cyberattacks and their impacts on different PLCs from different vendors.
- -
- We provide a new systematization of the recent studies based on three attack scenario models.
- -
- We identify the current security challenges in protecting PLCs from such attacks.
- -
- We suggest future research paths to protect PLC-based environments from control logic injection threats.
2. Background
2.1. PLC Architecture
2.2. PLC Runtime Environment
2.3. PLC Control Logic
2.3.1. Source Code
2.3.2. Machine Code
3. Systematization Methodology
3.1. PLC Example Application
3.2. Control Logic Injection Scenarios
3.2.1. Scenario 1—Attackers Have Access to the Engineering Station
3.2.2. Scenario 2—Attackers Have Access to the Control Network
- -
- Modifying the control logic code in its decompiled format. To this end, attackers first reverse-engineer the program bytecode/binary, and then modify the decompiled code in its high-level source code. Afterward, they recompile the modified code to its low-level binary code and push it to the victim PLC through a network packet.
- -
- Modifying the control logic code in its compiled format. Here, attackers intercept the packets that contain the program bytecode, and replace the exact original bytes representing the code with malicious ones. The modified bytes are either identified by using a reverse-engineering method beforehand or prerecorded from another session prior to the attack. After the modification, attackers push the crafted packet to the PLC over the network.
3.2.3. Scenario 3—Attackers Have Access to the PLC’s Runtime Environment
3.3. Control Logic Vulnerabilities
3.3.1. V1—Race Condition
3.3.2. V2—Variables without Use
3.3.3. V3—Hidden Jumpers
3.3.4. V4—Improper Input Validation
3.3.5. V5—Predefined Hierarchical Memory Layout
3.3.6. V6—Real-Time Constraints
3.4. Security Goals
3.4.1. Confidentiality
3.4.2. Integrity
3.4.3. Availability
4. Control Logic Injection Attacks
4.1. Attack Scenario 1—Source Code Injection
4.2. Attack Scenario 2—Machine Code Injection
4.2.1. Decompiled Code Injection Attack
4.2.2. Compiled Code Injection Attack
4.3. Attack Scenario 3—Runtime Environment Injection
4.3.1. Control Logic Corruption Attacks
4.3.2. Control Logic Manipulation Attacks
5. PLC Vendors Responses to Control Logic Injection Attacks
5.1. Siemens
- -
- Users are recommended to apply protection-level 3 (read/write protection), i.e., protecting the control logic with a password. Therefore, whenever an ICS supervisor attempts to access the control logic running in a PLC, the device first requires an authentication to allow him to read/write the code.
- -
- Siemens strongly recommends one protect network access to devices with appropriate mechanisms, e.g., cell protection concept, network segmentation, etc.
- -
- Consumers are encouraged to use virtual private networks (VPNs) for protecting network communication between cells, operate the device only within trusted networks, and apply defense-in-depth. These measures aid the prevention of external attackers from accessing the PLC and its running program via web vulnerabilities.
- -
- Users of Siemens S7 PLCs should configure an intrusion detection system (IDS) to monitor traffic for unusual or unauthorized activity.
- -
- Using firewalls to manage communication to and within the automation network. All control system networks and remote devices should be located behind firewalls and be isolated from the business network.
- -
- Allowing only known and verified MAC addresses to communicate with appropriate resources on the automation network. For instance, users should not permit a policy allowing any engineering workstation to communicate with all PLCs on the automation network.
5.2. Schneider Electric
- -
- Users are highly recommended to set up network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.
- -
- Users should disable all unused protocols, especially programming protocol. This action will prevent unintended remote programming access.
- -
- Schneider recommends its consumers to set a password to protect the project. Users are also advised to not use the same password for both read and write access on the controller.
- -
- Users should locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.
- -
- Users are recommended to install physical controls, so no unauthorized personnel can access industrial control and safety systems, components, and networks.
- -
- All PLCs should be placed in locked cabinets and never left in the “Program” mode.
- -
- It is encouraged that one minimize network exposure for all industrial devices and systems and ensure that they are not accessible from the Internet.
- -
- When remote access is required, ICS operator should use secure methods such as VPNs. However, VPNs may also have vulnerabilities and should be updated to the most current version available.
5.3. Rockwell Automation
- -
- Users are advised to monitor PLC change log for any unexpected modifications or anomalous activity.
- -
- Users should utilize the controller log feature, as well as use change detection in the Logix designer application.
- -
- If it is possible, users should utilize the functionality in FactoryTalkAssetCenter software to detect control logic changes.
- -
- Users are strongly advised to implement CIP Security (https://literature.rockwellautomation.com/idc/groups/literature/documents/at/secure-at001_-en-p.pdf (accessed on 25 October 2022)) to assist in preventing unauthorized connections when properly deployed.
- -
- It is recommended that one minimize network exposure for all control devices and/or systems, and ensure they are not accessible from the Internet.
- -
- Users should locate control system networks and remote devices behind firewalls and isolate them from the business network.
6. Security Challenges and Future Direction Recommendations
6.1. Security Challenges
6.1.1. Expended Attack Surfaces
6.1.2. Predefined Hierarchical Memory Layout
6.1.3. Confidentiality and Integrity of the Program I/O
6.1.4. Stealthy Attacks
6.1.5. Different Schemes for Compiling Codes
6.2. Future Research Recommendations
6.2.1. Source Code Injection
6.2.2. Bytecode/Binary Injection
6.2.3. Control Logic Manipulation Attacks
6.2.4. Control Logic Corruption Attacks
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
A | Availability |
ACM | Association for Computing Machinery |
ASLR | Address Space Layout Randomization |
C | Confidentiality |
CaFDI | Controller aware False Data Injeciton |
CI | Critical Infrastructure |
CIA | Confidentiality Integrity Availability |
CLIK | Control Logic Injection Attack |
CPU | Central Processing Unite |
CVE | Common Vulnerabilities and Exposures |
DBLP | Digital Bibliographic Library Publication |
DoS | Denial of Service |
DPI | Deep Packet Inspection |
EEPROM | Electrically Erasable Programmable Read-only Memory |
FBD | Function Block Diagram |
FWD | Forward |
HMI | Human Machine Interface |
I | Integrity |
ICS | Industrial Control System |
ICS-CERT | Industrial Control Systems Cyber Emergency Response Team |
ICSREF | Industrial Control System Reverse Engineering Framework |
IDE | Integrated Development Environment |
IDS | Intrusion Detection System |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IL | Instruction List |
I/O | Input/Output |
ISO-TSAP | International Organization for Standardization-Transport Service Access Point |
IT | Information Technology |
JMP | Jump |
JTAG | Joint Test Action Group |
LD | Ladder Diagram |
LLB | Ladder Logic Bombs |
MAC | Media Access Control |
MC | Machine Code |
NDAAO | Non-Deterministic Autonomous Automation with Output |
NVD | National Vulnerability Database |
OB | Organization Block |
OS | Operating System |
PCCC | Programmable Controller Communication Commands |
PLC | Programmable Logic Controller |
RAM | Random Access Memory |
RTN | Return |
S | Sensor |
SABOT | Specification-based Attacks against Boolean Operations and Timers |
SCADA | Supervisory Control and Data Acquisition |
SFC | Sequential Function Chart |
SNMP | Simple Network Management Protocol |
ST | Structured Text |
TIA | Totally Integrated Automation |
ToD | Time of Day |
V | Vulnerability |
VPN | Virtual Private Network |
References
- Alsabbagh, W.; Langendörfer, P. A Stealth Program Injection Attack against S7-300 PLCs. In Proceedings of the 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain, 10–12 March 2021; pp. 986–993. Available online: https://ieeexplore.ieee.org/document/9453483 (accessed on 4 November 2022).
- Falliere, N.; Murchu, L.O.; Chien, E. W32. Stuxnet Dossier, White Paper Symantec Corp. Security Response. 2011; Volume 5, p. 29. Available online: http://popsci.com.au/files/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (accessed on 4 November 2022).
- Pinto, A.D.; Dragoni, Y.; Carcano, A. Triton: The first ics cyber attack on safety instrument systems. In Proceedings of the Black Hat USA, Las Vegas, NV, USA, 4–9 August 2018; pp. 1–26. Available online: https://www.nozominetworks.com///downloads/US/Nozomi-Networks-TRITON-The-First-SIS-Cyberattack.pdf?__hstc=46213176.fb847b8c24524308051f92c191e5a1c8.1657985478826.1658174564396.1658186120920.11&__hssc=46213176.3.1658186120920&__hsfp=1542169609 (accessed on 4 November 2022).
- Assante, M.J. Confirmation of a Coordinated Attack on the Ukrainian Power Grid. SANS Industrial Control Systems Security Blog: 2016; p. 207. Available online: https://www.sans.org/blog/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid/ (accessed on 4 November 2022).
- Sun, R.; Mera, A.; Lu, L.; Choffnes, D. SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria, 6–10 September 2021; pp. 385–402. [Google Scholar] [CrossRef]
- Tiegelkamp, M.; John, K. IEC 61131-3: Programming Industrial Automation Systems; Springer: Berlin/Heidelberg, Germany, 2001; Volume VI, p. 376. [Google Scholar]
- Beresford, D. Exploiting Siemens Simatic S7 PLCs. In Proceedings of the Black Hat USA, Las Vegas, NV, USA, 3–4 August 2011; pp. 723–733. [Google Scholar]
- ICS-CERT. CVE-2017-13997. Available online: https://nvd.nist.gov/vuln/detail/CVE-2017-13997 (accessed on 18 June 2022).
- ICS-CERT. CVE-2018-10619. Available online: https://nvd.nist.gov/vuln/detail/CVE-2018-10619 (accessed on 21 June 2022).
- ICS-CERT. CVE-2017-12739. Available online: https://nvd.nist.gov/vuln/detail/CVE-2017-12739 (accessed on 22 June 2022).
- ICS-CERT. CVE-2017-12088. Available online: https://nvd.nist.gov/vuln/detail/CVE-2017-12088 (accessed on 23 June 2022).
- ICS-CERT. CVE-2019-10922. Available online: https://nvd.nist.gov/vuln/detail/CVE-2019-10922 (accessed on 22 June 2022).
- Perrin, C. The CIA Triad; 2008. Available online: http://www.techrepublic.com/blog/security/the-cia-triad (accessed on 3 July 2022).
- Serhane, A.; Raad, M.; Raad, R.; Susilo, W. PLC code-level vulnerabilities. In Proceedings of the International Conference on Computer and Applications (ICCA), Beirut, Lebanon, 25–26 August 2018; pp. 348–352. Available online: https://ieeexplore.ieee.org/document/8460287/ (accessed on 7 March 2022).
- Valentine, S.E. Plc Code Vulnerabilities through Scada Systems. Ph.D. Thesis, University of South Carolina, Computer Science Dept., Columbia, SC, USA, 1 January 2013. Available online: https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=1804&context=etd (accessed on 3 April 2022).
- McLaughlin, S.; Zonouz, S. Controller-aware false data injection against programmable logic controllers. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2014; pp. 848–853. [Google Scholar] [CrossRef]
- McLaughlin, S. On Dynamic malware payloads aimed at programmable logic controllers. In Proceedings of the 6th USENIX Conference on Hot Topics in Security, San Francisco, CA, USA, 9 August 2011; Available online: https://www.usenix.org/legacy/events/hotsec11/tech/final_files/McLaughlin.pdf (accessed on 7 April 2022).
- McLaughlin, S.; McDaniel, P. SABOT: Specification-based payload generation for programmable logic controllers. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 439–449. [Google Scholar]
- Senthivel, S.; Dhungana, S.; Yoo, H.; Ahmed, I.; Roussev, V. Denial of Engineering Operations Attacks in industrial Control Systems. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, Tempe, AZ, USA, 19–21 March 2018; pp. 319–329. [Google Scholar] [CrossRef]
- Keliris, A.; Maniatakos, M. ICSREF: A framework for automated reverse engineering of industrial control systems binaries. In Proceedings of the 26th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, 24–27 February 2019; Available online: https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_07A-5_Keliris_paper.pdf (accessed on 3 May 2022).
- Kalle, S.; Ameen, N.; Yoo, H.; Ahmed, I. CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC. In Proceedings of the Workshop on Binary Analysis Research (BAR), San Diego, CA, USA, 24 February 2019; Available online: https://www.ndss-symposium.org/wp-content/uploads/bar2019_74_Kalle_paper.pdf (accessed on 8 May 2022).
- Qasim, S.A.; Smith, J.M.; Ahmed, I. Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems. Forensic Sci. Int. Digit. Investig. 2020, 33, 301013. [Google Scholar] [CrossRef]
- Alsabbagh, W.; Langendörfer, P. A Control Injection Attack against S7 PLCs -Manipulating the Decompiled Code. In Proceedings of the IECON 2021—47th Annual Conference of the IEEE Industrial Electronics Society, Toronto, ON, Canada, 13–16 October 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Klick, J.; Lau, S.; Marzin, D.; Malchow, J.O.; Roth, V. Internet-facing PLCs as a network backdoor. In Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 524–532. Available online: https://ieeexplore.ieee.org/document/7346865 (accessed on 17 May 2022).
- Spenneberg, R.; Bruggemann, M.; Schwartke, H. Plc-Blaster: A Worm Living Solely in the Plc. Black Hat Asia, Marina Bay Sands: Singapore. 2016. Available online: https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC-wp.pdf (accessed on 24 May 2022).
- Lei, C.; Donghong, L.; Liang, M. The spear to break the security wall of S7CommPlus. In Proceedings of the Black Hat Europe, London, UK, 4–7 December 2017; Available online: https://www.blackhat.com/docs/eu-17/materials/eu-17-Lei-The-Spear-To-Break%20-The-Security-Wall-Of-S7CommPlus-wp.pdf (accessed on 17 May 2022).
- Biham, E.; Bitan, S.; Carmel, A.; Dankner, A.; Malin, U.; Wool, A. Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs. In Proceedings of the Black Hat USA, Las Vegas, NV, USA, 3–8 August 2019; Available online: https://i.blackhat.com/USA-19/Thursday/us-19-Bitan-Rogue7-Rogue-Engineering-Station-Attacks-On-S7-Simatic-PLCs-wp.pdf (accessed on 3 June 2022).
- Hui, H.; McLaughlin, K. Investigating Current PLC Security Issues Regarding Siemens S7 Communications and TIA Portal. In Proceedings of the 5th International Symposium for ICS & SCADA Cyber Security Research, Hamburg, Germany, 29–30 August 2018; pp. 67–73. [Google Scholar] [CrossRef] [Green Version]
- Hui, H.; McLaughlin, K.; Sezer, S. Vulnerability analysis of S7 PLCs: Manipulating the security mechanism. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100470. [Google Scholar] [CrossRef]
- Alsabbagh, W.; Langendörfer, P. Patch Now and Attack Later—Exploiting S7 PLCs by Time-Of-Day Block. In Proceedings of the 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Victoria, BC, Canada, 10–12 May 2021; pp. 144–151. [Google Scholar] [CrossRef]
- Alsabbagh, W.; Langendorfer, P. A New Injection Threat on S7-1500 PLCs—Disrupting the Physical Process Offline. IEEE Open J. Ind. Electron. Soc. 2022, 3, 146–162. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9713953 (accessed on 21 July 2022). [CrossRef]
- Alsabbagh, W.; Langendörfer, P. No Need to be Online to Attack—Exploiting S7-1500 PLCs by Time-Of-Day Block. In Proceedings of the 2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT), Sarajevo, Bosnia and Herzegovina, 16–18 June 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Basnight, Z. Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers. Master’s Thesis, Graduate School of Engineering and Management Air Force Institute of Technology Air University, Wright Patterson Air Force Base, OH, USA, 2013. [Google Scholar]
- Basnight, Z.; Butts, J.; Lopez, J., Jr.; Dube, T. Firmware modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 2013, 6, 76–84. [Google Scholar] [CrossRef]
- Peck, D.; Peterson, D. Leveraging ethernet card vulnerabilities in field devices. In Proceedings of the SCADA Security Scientific Symposium; 2009; pp. 1–19. Available online: http://www.icsdefender.ir/files/scadadefender-ir/paygahdanesh/gheyreboomi/asibpaziriha/DigitalBond%20-%20Leverage%20Ethernet%20Vulnerabilities%20in%20Field%20Devices.pdf (accessed on 4 August 2022).
- Schuett, C.; Butts, J.; Dunlap, S. An evaluation of modification attacks on programmable logic controllers. Int. J. Crit. Infrastruct. Prot. 2014, 7, 61–68. [Google Scholar] [CrossRef]
- Rais, M.H.; Awad, R.A.; Lopez, J.; Ahmed, I. JTAG-based PLC memory acquisition framework for industrial control systems. Forensic Sci. Int. Digit. Investig. 2021, 37, 301196. [Google Scholar] [CrossRef]
- Garcia, L.A.; Brasser, F.; Cintuglu, M.H.; Sadeghi, A.R.; Mohammed, O.; Zonouz, S.A. Hey, my malware knows physics! Attacking PLCs with physical model aware rootkit. In Proceedings of the 2017 Network and Distributed System Security Symposium, San Diego, CA, USA, 26 February–1 March 2017; Available online: https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/hey-my-malware-knows-physics-attacking-plcs-physical-model-aware-rootkit/ (accessed on 11 July 2022).
- Lim, B.; Chen, D.; An, Y.; Kalbarczyk, Z.; Iyer, R. Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report. In Proceedings of the 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), Christchurch, New Zealand, 22–25 January 2017; pp. 205–210. [Google Scholar] [CrossRef]
- Wang, Y.; Liu, J.; Yang, C.; Zhou, L.; Shuangfei, L.; Zhaoyan, X. Access Control Attacks on PLC Vulnerabilities. J. Comput. Commun. 2018, 6, 311–325. [Google Scholar] [CrossRef] [Green Version]
- Yoo, H.; Ahmed, I. Control Logic Injection Attacks on Industrial Control Systems. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection, Lisabon, Portugal, 25–27 June 2019; Available online: https://link.springer.com/content/pdf/10.1007/978-3-030-22312-0_3.pdf (accessed on 17 August 2022).
- Yoo, H.; Kalle, S.; Smith, J.M.; Ahmed, I. Overshadow plc to detect remote control-logic injection attacks. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019, Gothenburg, Sweden, 19–20 June 2019; Perdisci, R., Maurice, C., Giacinto, G., Almgren, M., Eds.; Lecture Notes in Computer Science. Springer: Cham, Switzerland, 2019; Volume 11543. Available online: http://www.people.vcu.edu/~iahmed3/publications/dimva_2019_shade.pdf (accessed on 26 July 2022).
- Govil, N.; Agrawal, A.; Tippenhauer, N.O. On ladder logic bombs in industrial control systems. In Computer Security, Proceedings of the SECPRE, Oslo, Norway, 14–15 September 2017; Springer: Cham, Switzerland, 2017; Volume 10683. [Google Scholar] [CrossRef] [Green Version]
- Xiao, M.; Wu, J.; Long, C.; Li, S. Construction of false sequence attack against PLC based power control system. In Proceedings of the 2016 35th Chinese Control Conference (CCC), Chengdu, China, 27–29 July 2016; pp. 10090–10095. [Google Scholar] [CrossRef]
- Alsabbagh, W.; Langendörfer, P. A Fully-Blind False Data Injection on PROFINET I/O Systems. In Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE), Kyoto, Japan, 20-23 June 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Noorizadeh, M.; Shakerpour, M.; Meskin, N.; Ünal, D.; Kho-rasani, K. A Cyber-Security Methodology for a Cyber-Physical Indus-trial Control System Testbed. IEEE Access 2021, 9, 16239–16253. [Google Scholar] [CrossRef]
- Abbasi, A.; Hashemi, M. Ghost in the PLC designing an undetectable programmable logic controller rootkit via pin control attack. In Proceedings of the Black Hat Europe, London, UK, 3–4 November 2016; pp. 1–35. Available online: https://www.blackhat.com/docs/eu-16/materials/eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit-wp.pdf (accessed on 3 July 2022).
- McLaughlin, S.; Zonouz, S.; Pohly, D.; McDaniel, P. A Trusted Safety Verifier for Process Controller Code. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 23–26 February 2014; Available online: https://web.eecs.umich.edu/~mahlke/courses/583f18/lectures/Nov26/paper2.pdf (accessed on 7 July 2022).
- Zonouz, S.; Rrushi, J.; McLaughlin, S. Detecting Industrial Control Malware Using Automated PLC Code Analytics. IEEE Secur. Priv. 2014, 12, 40–47. [Google Scholar] [CrossRef]
- Ferrari, A.; Magnani, G.; Grasso, D.; Fantechi, A. Model checking interlocking control tables. In FORMS/FORMAT 2010; Springer: Berlin/Heidelberg, Germany, 2011; pp. 107–115. [Google Scholar]
- RX Family User’s Manual: Software, Renesas Electronics. 2013. Available online: https://www.renesas.com/us/en/document/mas/rx-family-users-manual-software-rev120?language=en (accessed on 16 July 2022).
- Wang, K.; Parekh, J.J.; Stolfo, S.J. Anagram: A content anomaly detector resistant to mimicry attack. In Proceedings of the International Conference on Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, 20–22 September 2006; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2006; Volume 4219, pp. 226–248. [Google Scholar] [CrossRef] [Green Version]
- SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families. Available online: https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf (accessed on 22 October 2022).
- SSA-603476: Web Vulnerabilities in SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs. Available online: https://cert-portal.siemens.com/productcert/pdf/ssa-603476.pdf (accessed on 22 October 2022).
- SSA-818183: Denial-of-Service Vulnerability in SIMATIC S7-300 CPU Family. Available online: https://cert-portal.siemens.com/productcert/pdf/ssa-818183.pdf (accessed on 22 October 2022).
- ICS Advisory (ICSA-11-223-01A). Available online: https://www.cisa.gov/uscert/ics/advisories/ICSA-11-223-01A (accessed on 22 October 2022).
- ICS Advisory (ICSA-20-343-04). Available online: https://www.cisa.gov/uscert/ics/advisories/icsa-20-343-04 (accessed on 22 October 2022).
- ICS Advisory (ICSA-21-194-02). Available online: https://www.cisa.gov/uscert/ics/advisories/icsa-21-194-02 (accessed on 22 October 2022).
- ICS Advisory (ICSA-22-090-05). Available online: https://www.cisa.gov/uscert/ics/advisories/icsa-22-090-05 (accessed on 22 October 2022).
- ICS Advisory (ICSA-21-056-03). Available online: https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-03 (accessed on 22 October 2022).
- Ayub, A.; Yoo, H.; Ahmed, I. Empirical Study of PLC Authentication Protocols in Industrial Control Systems. In Proceedings of the 15th IEEE Workshop on Offensive Technologies (WOOT’21), Co-Located with the 42nd IEEE Symposium on Security and Privacy and in Cooperation with UsenixAt, San Francisco, CA, USA, 27 May 2021. [Google Scholar] [CrossRef]
- Chekole, E.G.; Chattopadhyay, S.; Ochoa, M.; Guo, H.; Cheramangalath, S. CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. Comput. Secur. 2020, 94, 101832. [Google Scholar] [CrossRef]
- Chekole, E.G.; Ochoa, M.; Cheramangalath, S. SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. Int. J. Crit. Infrastruct. Prot. 2021, 33, 100431. [Google Scholar] [CrossRef]
- Chang, T.; Wei, Q.; Liu, W.; Geng, Y. Detecting plc Program Malicious Behaviors Based on State Verification; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2018; Volume 11067, pp. 241–255. [Google Scholar]
- Xie, Y.; Chang, R.; Jiang, L. A malware detection method using satisfactorily modulo theory model checking for the programmable logic controller system. Concurr. Comput. Pract. Exp. 2022, 34, e5724. [Google Scholar] [CrossRef]
- DotNet Siemens PLC ToolBox Library. Available online: https://github.com/dotnetprojects/DotNetSiemensPLCToolBoxLibrary (accessed on 22 October 2022).
Contribution’ Year | Attack Scenario | Vulnerability | Security Goal | PLC Vendor/Language | Tool |
---|---|---|---|---|---|
Serhane’18 [14] | 1 | V1,2,3 | C,I,A | Rockwell/LD | N/A |
Valentine’13 [15] | 1 | V1,2,3,6 | C,I | Rockwell/LD | PLC-SF |
McLaughlin’14 [16] | 1,3 | V4 | I | N/A/generic | CaFDI |
McLaughlin’11 [17] | 2 | V4 | I | Siemens/LD | N/A |
McLaughlin’12 [18] | 2 | V4 | I | Siemens/LD | NuSMV |
Senthivel’18 [19] | 2 | V4 | I | Rockwell/LD | Laddis |
Keliris’19 [20] | 2 | V4 | I | N/A/generic | ICSREF |
Kella ’19 [21] | 2,3 | V4 | I | Schneider/IL | CLIK |
Qasim’20 [22] | 2 | V4 | I | Schneider/IL | Reditus |
Alsabbagh’21 [1] | 2 | V4 | I,A | Siemens/ST | N/A |
Alsabbagh’21 [23] | 2 | V4 | I | Siemens/LD | N/A |
Beresford’11 [7] | 2,3 | V4,5 | I | Siemens/LD | Metasploit |
Klick’15 [24] | 2,3 | V5 | I | Siemens/IL | PLCinject |
Spenneberg’16 [25] | 2,3 | V5 | C,A | Siemens/IL | PLC-Blaster |
Lei’17 [26] | 2 | V5 | I | Siemens/N/A | Spear |
Biham’19 [27] | 2 | V5 | I | Siemens/N/A | Rogue7 |
Hui’18 [28] | 2 | V5 | C, I | Siemens/N/A | N/A |
Hui’21 [29] | 2 | V5 | C, I | Siemens/N/A | N/A |
Alsabbagh’21 [30] | 2 | V3,5,6 | I | Siemens/ST | PLCinject |
Alsabbagh’22 [31,32] | 2 | V3,5,6 | I | Siemens/ST | PLCInject |
Basnight’13 [33] | 3 | V4 | I | Allen-Bradley/N/A | N/A |
Basnight’13 [34] | 3 | V4 | I | Allen-Bradley/N/A | N/A |
Peck’09 [35] | 3 | V4 | I | Koyo, Rockwell/N/A | N/A |
Schuett’14 [36] | 3 | V4 | I | Allen-Bradley/N/A | N/A |
Rais’21 [37] | 3 | V4 | I | Allen-Bradley/N/A | Kyros |
Garcia’17 [38] | 3 | V4,5 | I,C | Allen-Bradley/N/A | HARVEY |
Lim’17 [39] | 3 | V4,5 | I,A | Schneider/N/A | N/A |
Wang’18 [40] | 3 | V4,5 | I,A | Siemens/N/A | N/A |
Yoo’19 [41,42] | 3 | V5 | I,A | Schneider, Allen-Bradley/N/A | DPI |
Govil’17 [43] | 3 | V4,6 | I | Allen-Bradley/LD | LLB |
Xiao’16 [44] | 3 | V4 | I | N/A/generic | N/A |
Alsabbagh’21 [45] | 3 | V1,4,6 | I | Siemens/N/A | N/A |
Noorizadeh’21 [46] | 3 | V1,4,6 | I | Siemens/N/A | N/A |
Abbasi’16 [47] | 3 | V4 | I | Generic/Codesys-based | Codesys platform |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alsabbagh, W.; Langendörfer, P. A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers. Automation 2022, 3, 596-621. https://doi.org/10.3390/automation3040030
Alsabbagh W, Langendörfer P. A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers. Automation. 2022; 3(4):596-621. https://doi.org/10.3390/automation3040030
Chicago/Turabian StyleAlsabbagh, Wael, and Peter Langendörfer. 2022. "A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers" Automation 3, no. 4: 596-621. https://doi.org/10.3390/automation3040030
APA StyleAlsabbagh, W., & Langendörfer, P. (2022). A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers. Automation, 3(4), 596-621. https://doi.org/10.3390/automation3040030