With the advent of Industry 4.0, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, increasingly interconnected and therefore exposed to cyber-physical attacks, i.e., security breaches in cyberspace that may adversely affect the physical processes underlying industrial control systems. In this paper, we propose a formal approach based on runtime enforcement to ensure specification compliance in networks of controllers, possibly compromised by colluding malware that may tamper with actuator commands, sensor readings, and inter-controller communications. Our approach relies on an ad-hoc sub-class of Ligatti et al.'s edit automata to enforce controllers represented in Hennessy and Regan's Timed Process Language. We define a synthesis algorithm that, given an alphabet $P$ of observable actions and a timed correctness property $e$, returns a monitor that enforces the property $e$ during the execution of any (potentially corrupted) controller with alphabet $P$, and complying with the property $e$. Our monitors correct and suppress incorrect actions coming from corrupted controllers and emit actions in full autonomy when the controller under scrutiny is not able to do so in a correct manner. Besides classical requirements, such as transparency and soundness, the proposed enforcement enjoys deadlock- and diverge-freedom of monitored controllers, together with scalability when dealing with networks of controllers. Finally, we test the proposed enforcement mechanism on a non-trivial case study, taken from the context of industrial water treatment systems, in which the controllers are injected with different malware with different malicious goals.
翻译:随着工业4.0的到来,工业设施和关键基础设施正在转变为由各种物理和网络组成部分组成的生态系统,如可编程逻辑控制器等,日益相互关联,因此受到网络-物理攻击,即网络空间的安全漏洞可能对工业控制系统的物理过程产生不利影响。在本文件中,我们提议采用基于运行时间强制执行的正式方法,以确保控制器网络符合规格,可能因为串通恶意软件可能破坏任何动作指令、感官读数和控制器通信而受到损害。我们的方法依赖于Ligatti et al. 编辑Automata 以强制执行在Hennnesy和Regan的定时进程语言中所代表的控制器。我们提出了一种基于运行时间强制执行的公式$P$和定时正确性产权的合成算法,在任何(可能损坏的)字母为美元的自由控制器执行期间,以及遵循财产的美元。我们的监测器对来自腐败控制器和他人的不正确行为进行编辑,在透明化过程中,在对腐败的网络进行不透明性检查时,在完全透明的情况下,在透明的情况下,对腐败控制器的操作中,在透明性方面,在完全透明的情况下,在透明的情况下,在透明中,在透明中,在透明中,在完全透明中,在透明中,在透明中,在透明中,在透明中,在透明中,在透明中,在透明中进行这样的操作中,在完全操作中,在透明中,在透明中,在完全操作中,在完全操作中处理。