• DocumentCode
    3705271
  • Title

    Internet-facing PLCs as a network backdoor

  • Author

    Johannes Klick;Stephan Lau;Daniel Marzin;Jan-Ole Malchow;Volker Roth

  • Author_Institution
    Freie Universit?t Berlin - Secure Identity Research Group, Germany
  • fYear
    2015
  • Firstpage
    524
  • Lastpage
    532
  • Abstract
    Industrial control systems (ICS) are integral components of production and control processes. Our modern infrastructure heavily relies on them. Unfortunately, from a security perspective, thousands of PLCs are deployed in an Internet-facing fashion. Security features are largely absent in PLCs. If they are present then they are often ignored or disabled because security is often at odds with operations. As a consequence, it is often possible to load arbitrary code onto an Internet-facing PLC. Besides being a grave problem in its own right, it is possible to leverage PLCs as network gateways into production networks and perhaps even the corporate IT network. In this paper, we analyze and discuss this threat vector and we demonstrate that exploiting it is feasible. For demonstration purposes, we developed a prototypical port scanner and a SOCKS proxy that runs in a PLC. The scanner and proxy are written in the PLC´s native programming language, the Statement List (STL). Our implementation yields insights into what kinds of actions adversaries can perform easily and which actions are not easily implemented on a PLC.
  • Keywords
    "Hardware","Control systems","Software","Programming","Debugging"
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2015 IEEE Conference on
  • Type

    conf

  • DOI
    10.1109/CNS.2015.7346865
  • Filename
    7346865