Open nikorev opened 4 years ago
Reviewer: Akinori Kahata Review type: Critical
Reviewer: Lily Shpak Review Type: Critical
This paper is attempting to solve the vulnerabilities associated with having cyber-physical systems. A lot of malicious actors use vulnerabilities in the software to attack physical systems. This means putting the system out of zone that is considered its admissible states
The authors of this paper try to solve this problem by creating a secure execution interval or SEI. SEIs make it so that every cycle the system checks the state of the physical system to make sure that it is still in admissible state. The authors state that this system will be able to dynamically react to a change in the state that would make the system to no longer be admissible.
Reviewer: Sean McBride
Review Type: Critical Review
How can the baseline safety of the physical plant of a cyber-physical system be preserved even when the software is fully-compromised?
Reviewer: Becky Shanley Review Type: Comprehension
Problem Being Solved This paper attempts to utilize the properties of physical plants to ensure the safety of these plants. Since the safety requirements of these plants are essential to their operation, they are vulnerable to both physical and cyber-attacks.
Main Contributions This paper provides the analytical framework that utilizes the physical properties to compute safe operational windows in run-time during which, safety is guaranteed. It identifies the operational window by leveraging the fact that due to physical inertia, the total destabilization of the plant is time-consuming.
Questions
Reviewer: Alvaro Albero Review Type: Comprehensive
Cyber-physical systems (CPS) require increased security measures then other systems as the damaged caused by compromising them can be higher due to their physical characteristics. In this paper the authors demonstrate a way to ensure safety in CPS.
Leveraging the fact that due to inertia an attacker with full control of a system cannot destabilize it instantly, the authors develop a solution to recover control of the system within a secure period of time. First, they design an analytical method to estimate the window of time an attacker would need to damage the system. Second, they implement a system reset that is periodically executed within that period of time or an alternative that uses trusted execution environments (TEE). Finally, they test their solution in a prototype implementation.
Reviewer: Graham Schock Review Type: Critical
Problem Being Solved Cyber physical systems have dangerous physical consequences when compromised. This is even more disastrous when human physical well being can be the victim of an attack. This issue is even more pronounced when these devices are interconnected with other devices and interconnected to the internet. There are many ways for a hacker to enter and gain access to a cyber physical system and many disastrous things they can do once inside the system. This shows that security of cyber physical systems needs to be improved.
Contributions In order to ensure the safety of the cyber physical system, the paper develops methods to ensure basic safe operation of a system in respect to cyber attacks. While this paper does go over how to stop an attacker from entering a system, instead it asks the question how we can ensure that a cyber physical system will not crash. To do this the paper using the concept of physical inertia and that it is impossible to crash systems instantly.In order to support these methods and models the paper details a drone example where we can model the physical state mathematically and therefore we can model the time a hacker needs to destroy the system. With this information we can thwart the attacker by periodically restarting the system.
Questions
Critiques
There were some major assumptions about the architecture the device needs to have. One of the biggest assumptions is that the Operating System needs to be in read only memory, is this applicable to actual cyber physical systems, this would make it a lot harder to do things like updates.
I wish there was more discussion of the trade offs that the restart implementation has. Whenever I restart my computer the battery is pretty drained. This is especially hard with cyber physical systems where power is a difficult issue.
Attacks against Cyber Physical Systems have the opportunity to cause physical damage to systems like plants. While there are other attack vectors this paper attempts to address attacks that aim to cause physical damage to the system.
This paper recognizes that CPSs have consistent physical properties that can allow software a window of time to clean itself before physical damage occurs. Any attacks on a CPS will take a certain time T to cause physical damage. This paper proposes two solutions that use the knowledge of this time T to identify and correct errors before physical damage is done.
Does the length of the Secure Execution Interval change from system to system and at some point is the SEI too small to get anything useful done?
What are the resource requirements of trust zone tech and can a smaller more resource constrained system support them?
How would updates work on a system like this, if the trusted code is in read only memory?
The restart model requires stateless controller operation. How many existing controllers are able to be restarted regularly and still provide useful work?
Since the SEI interval is calculated dynamically based on sensor readings and state is not preserved. A sensor that relies on a low pass filter will consistently have bad readings if state is not preserved.
When a cyber physical system has a problem, it is not only the software that is affected, it is also the hardware and the real world. This magnifies the effect of attacks, leading to damage to people and/or property.
This paper purposes a system based on "safe states" and timers. If you're in a "safe state" then you have $N seconds/steps before you crash. If we set a timer for $N - restart time as soon as you leave a safe state, and then restart then, we can ensure the system is always working right. (Assuming we can prevent the program from halting the restart.) That is a very simplified view of the contribution of the paper.
Reviewer: Pat Cody Review Type: Comprehensive
When a cyber-physical system is compromised, it carries the risk of damaging the plant, environment, and humans. Normally, these systems are designed to mitigate and prevent intrusions, but there will always be an unforeseen vulnerability, especially when connected to the internet.
This paper contributes a formal guarantee of a system's baseline safety by creating the notion of Secure Execution Intervals (SEI), a technique to prevent end-point devices from causing physical damage to a plant. Even if a device is compromised, the attacker won't have enough time to cause any physical harm before the next interval. SEI works either via restarts, or using a Trusted Execution Environment (TEE).
Recent attacks on cyber-physical systems have shown that software vulnerabilities can be leveraged to cause physical harm to those systems. The ability to cause physical damage creates a risk to human safety, and connecting these systems to the internet will only make the problem worse.
This paper demonstrates a way to preserve the physical functionality of the embedded system during a cyber attack using secure execution intervals. This method prevents an attacker from having control of the system for long enough to cause any physical damage.
1) How does the system check the validity of the running program? Could that system be manipulated to not trigger a reset?
2) Would the resets cause data to be lost from the input devices?
3) How long does it take to check each program for validity and is this scalable for multiple applications and devices?
Please add all comprehensive and critical reviews below
Notable Questions Still updating