Abstract
Cyber physical systems (CPS) typically contain multiple control loops, where the controllers use actuators to trigger a physical process, based on sensor readings. Attackers typically coordinate attack with multiple corrupted devices; defenses often focus on detecting this abnormal communication. We present the first provably-covert channel from a ‘covertly-transmitting sensor’ to a ‘covertly-receiving actuator’, interacting only indirectly, via a benign threshold-based controller. The covert devices cannot be practically distinguished from benign devices. The covert traffic is encoded within the output noise of the covertly-transmitting sensor, whose distribution is indistinguishable from that of a benign sensor (with comparable specifications). We evaluated the channel, showing its applicability for signaling and coordinating attacks between the sensor and the actuator. This capability requires to re-evaluate security monitoring and preventing systems in CPS.
Original language | English |
---|---|
Title of host publication | Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019 |
Publisher | Association for Computing Machinery |
Pages | 638-649 |
Number of pages | 12 |
ISBN (Electronic) | 9781450376280 |
DOIs | |
State | Published - 9 Dec 2019 |
Event | 35th Annual Computer Security Applications Conference, ACSAC 2019 - San Juan, United States Duration: 9 Dec 2019 → 13 Dec 2019 |
Publication series
Name | ACM International Conference Proceeding Series |
---|
Conference
Conference | 35th Annual Computer Security Applications Conference, ACSAC 2019 |
---|---|
Country/Territory | United States |
City | San Juan |
Period | 9/12/19 → 13/12/19 |
Bibliographical note
Funding Information:This research is in part supported by an endowment from the Comcast corporation. The opinions expressed in the paper are those of the researchers themselves and not of their universities or of Comcast. We would like to acknowledge Dvir Shemesh for his support in this research.
Funding Information:
ACKNOWLEDGEMENTS: This research is in part supported by an endowment from the Comcast corporation. The opinions expressed in the paper are those of the researchers themselves and not of their universities or of Comcast. We would like to acknowledge Dvir Shemesh for his support in this research.
Publisher Copyright:
© 2019 Association for Computing Machinery.
Keywords
- Covert channel
- Cyber physical systems
- Cyber security
- Intrusion detection