CPAC: Securing Critical Infrastructure with Cyber-physical Access Control
Title | CPAC: Securing Critical Infrastructure with Cyber-physical Access Control |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Etigowni, Sriharsha, Tian, Dave(Jing), Hernandez, Grant, Zonouz, Saman, Butler, Kevin |
Conference Name | Proceedings of the 32Nd Annual Conference on Computer Security Applications |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4771-6 |
Keywords | composability, insider threat, Metrics, pubcrawl, taint analysis |
Abstract | Critical infrastructure such as the power grid has become increasingly complex. The addition of computing elements to traditional physical components increases complexity and hampers insight into how elements in the system interact with each other. The result is an infrastructure where operational mistakes, some of which cannot be distinguished from attacks, are more difficult to prevent and have greater potential impact, such as leaking sensitive information to the operator or attacker. In this paper, we present CPAC, a cyber-physical access control solution to manage complexity and mitigate threats in cyber-physical environments, with a focus on the electrical smart grid. CPAC uses information flow analysis based on mathematical models of the physical grid to generate policies enforced through verifiable logic. At the device side, CPAC combines symbolic execution with lightweight dynamic execution monitoring to allow non-intrusive taint analysis on programmable logic controllers in realtime. These components work together to provide a realtime view of all system elements, and allow for more robust and finer-grained protections than any previous solution to securing the grid. We implement a prototype of CPAC using Bachmann PLCs and evaluate several real-world incidents that demonstrate its scalability and effectiveness. The policy checking for a nation-wide grid is less than 150 ms, faster than existing solutions. We additionally show that CPAC can analyze potential component failures for arbitrary component failures, far beyond the capabilities of currently deployed systems. CPAC thus provides a solution to secure the modern smart grid from operator mistakes or insider attacks, maintain operational privacy, and support N - x contingencies. |
URL | http://doi.acm.org/10.1145/2991079.2991126 |
DOI | 10.1145/2991079.2991126 |
Citation Key | etigowni_cpac:_2016 |