Using High-level Synthesis to Predict and Preempt Attacks on Industrial Control Systems

dc.contributor.authorFranklin, Zane Ryanen
dc.contributor.committeechairPatterson, Cameron D.en
dc.contributor.committeememberBaumann, William T.en
dc.contributor.committeememberSchaumont, Patrick R.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-04-22T08:00:22Zen
dc.date.available2014-04-22T08:00:22Zen
dc.date.issued2014-04-21en
dc.description.abstractAs the rate and severity of malicious software attacks have escalated, industrial control systems (ICSes) have emerged as a particularly vulnerable target. ICSes govern the automation of the physical processes in industries such as power, water, oil and manufacturing. In contrast to the personal computing space, where attackers attempt to capture information or computing resources, the attacks directed at ICSes aim to degrade or destroy the physical processes or plants maintained by the ICS. Exploits with potentially catastrophic results are sold on brokerages to any interested party. Previous efforts in ICS security implicitly and mistakenly trust internal software. This thesis presents an architecture for trust enhancement of critical embedded processes (TECEP). TECEP assumes that all software can be or has already been compromised. Trust is instead placed in hardware that is invisible to any malicious software. Software processes critical for stable operation are duplicated in hardware, along with a supervisory process to monitor the behavior of the plant. Furthermore, a copy of the software and a model of the plant are implemented in hardware in order to estimate the system's future behavior. In the event of an attack, the hardware can successfully identify the plant's abnormal behavior in either the present or the future and supersede the software's directives, allowing the plant to continue functioning correctly. This approach to ICS security can be retrofitted to existing ICSes, has minimal impact on the ICS design process, and modestly increases hardware requirements in a programmable system-on-chip.en
dc.description.degreeMaster of Scienceen
dc.format.mediumETDen
dc.identifier.othervt_gsexam:2788en
dc.identifier.urihttp://hdl.handle.net/10919/47491en
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectIndustrial control systemsen
dc.subjectsecurityen
dc.subjectreconfigurable platformen
dc.subjecthigh-level synthesisen
dc.subjectsystem-on-chipen
dc.titleUsing High-level Synthesis to Predict and Preempt Attacks on Industrial Control Systemsen
dc.typeThesisen
thesis.degree.disciplineComputer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
Franklin_ZR_T_2014.pdf
Size:
4.91 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
Franklin_ZR_T_2014_support_1.pdf
Size:
191.56 KB
Format:
Adobe Portable Document Format
Description:
Supporting documents

Collections