DocumentCode
3580281
Title
Threat modelling of industrial controllers: A firmware security perspective
Author
Varghese, Anitha ; Bose, Arijit Kumar
Author_Institution
ABB Corp. Res., Bangalore, India
fYear
2014
Firstpage
1
Lastpage
4
Abstract
Industrial devices are becoming more and more networked, as M2M communications gain acceptance. Industrial controllers are usually resource constrained real time devices, and the firmware of these controllers play a vital role enabling the controllers to function accurately and reliably. Binary image of the firmware in these embedded controllers are usually key intellectual property of any OEM making the device. Developing the firmware for a control function is a time consuming process, and being able to get the binary image of firmware can accelarate the product building for counterfieting. We provide a survey of the different threats, different attack methods to materialize the threats, attacker capability required to mount an attack based on an existing threat, and the impact of these attacks on the system. In this paper, we discuss the traditional industrial firmware management process like its distribution, updation and installation in industrial controllers, and describe the security threats in the firmware management methods. We also provide mitigation methods to the threats identified.
Keywords
firmware; industrial property; production engineering computing; security of data; M2M communications; OEM; binary image; firmware security; industrial controllers; intellectual property; threat modelling; Access control; Authentication; Encryption; Microprogramming; Production; Anticounterfeiting; Confidentiality; Embedded Controller; Firmware; Industrial; Threats;
fLanguage
English
Publisher
ieee
Conference_Titel
Anti-counterfeiting, Security, and Identification (ASID), 2014 International Conference on
Print_ISBN
978-1-4799-7117-6
Type
conf
DOI
10.1109/ICASID.2014.7064951
Filename
7064951
Link To Document