![]() The Industrial Internet of Things (IIoT) is rapidly expanding the inter-connectivity of industrial control systems (ICSs). We have found 13 bugs and received 3 CVEs, 2 are classified as critical (CVSS3.x score CRITICAL 9.8) and affected 40 different products. ![]() We have implemented a prototype and used it to fuzz the supervisory software of four popular ICS platforms. We address this issue by synchronously managing external events (GUI operations and network traffic) during the fuzzing loop. To quickly reach the interesting states, traditional snapshot-based method does not work since the communication protocols are time sensitive. Our fuzzer distributes more budget on those interesting states. Then, we propose a state selection algorithm to find the protocol states that are more likely to have bugs. To avoid heavy human efforts in reverse-engineering the proprietary protocols, the proposed approach constructs a state-book based on the readily-available execution trace of the supervisory software and the corresponding inputs. In this work, we present a fuzzing framework to automatically discover implementation bugs residing in the communication protocols between the supervisory software and the field devices. Without the knowledge of the program states and packet formats, it is difficult to enter the deep states for effective fuzzing. ![]() However, fuzzing ICS supervisory software is challenging due to the prevalent use of proprietary protocols. Therefore, extensive security testing of supervisory software is crucial for the safe operation of ICS. Once compromised, it could be misused to control or manipulate these physical devices maliciously, endangering manufacturing process or even human lives. The supervisory software is widely used in industrial control systems (ICSs) to manage field devices such as PLC controllers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |