Visible to the public Timing Performance Profiling of Substation Control Code for IED Malware Detection

TitleTiming Performance Profiling of Substation Control Code for IED Malware Detection
Publication TypeConference Paper
Year of Publication2017
AuthorsRrushi, Julian L.
Conference NameProceedings of the 3rd Annual Industrial Control System Security Workshop
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6333-4
Keywordsbinary code analysis, control system malware, control theory, graph theory, Human Behavior, intelligent electronic devices, malware analysis, Metrics, privacy, pubcrawl, resilience, Resiliency, security
Abstract

We present a binary static analysis approach to detect intelligent electronic device (IED) malware based on the time requirements of electrical substations. We explore graph theory techniques to model the timing performance of an IED executable. Timing performance is subsequently used as a metric for IED malware detection. More specifically, we perform a series of steps to reduce a part of the IED malware detection problem into a classical problem of graph theory, namely finding single-source shortest paths on a weighted directed acyclic graph (DAG). Shortest paths represent execution flows that take the longest time to compute. Their clock cycles are examined to determine if they violate the real-time nature of substation monitoring and control, in which case IED malware detection is attained. We did this work with particular reference to implementations of protection and control algorithms that use the IEC 61850 standard for substation data representation and network communication. We tested our approach against IED exploits and malware, network scanning code, and numerous malware samples involved in recent ICS malware campaigns.

URLhttp://doi.acm.org/10.1145/3174776.3174779
DOI10.1145/3174776.3174779
Citation Keyrrushi_timing_2017