Award Abstract # 1222656
TWC: Small: Run-Time Prediction and Preemption of Stuxnet-Like Attacks in Embedded Process Controllers

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: VIRGINIA POLYTECHNIC INSTITUTE & STATE UNIVERSITY
Initial Amendment Date: August 27, 2012
Latest Amendment Date: August 27, 2012
Award Number: 1222656
Award Instrument: Standard Grant
Program Manager: Ralph Wachter
rwachter@nsf.gov
 (703)292-8950
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2012
End Date: August 31, 2016 (Estimated)
Total Intended Award Amount: $500,000.00
Total Awarded Amount to Date: $500,000.00
Funds Obligated to Date: FY 2012 = $500,000.00
History of Investigator:
  • Cameron Patterson (Principal Investigator)
    cdp@vt.edu
  • William Baumann (Co-Principal Investigator)
Recipient Sponsored Research Office: Virginia Polytechnic Institute and State University
300 TURNER ST NW
BLACKSBURG
VA  US  24060-3359
(540)231-5281
Sponsor Congressional District: 09
Primary Place of Performance: Virginia Polytechnic Institute and State University
302 Whittemore Hall (0111)
Blacksburg
VA  US  24061-0001
Primary Place of Performance
Congressional District:
09
Unique Entity Identifier (UEI): QDE5UHE5XD16
Parent UEI: X6KEFGLHSJX7
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001213DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7923
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Perimeter security and air gap approaches to preventing malware disruption of industrial and infrastructure processes are challenged by the complexity of modern control systems incorporating networked heterogeneous and software-updatable components such as personal computers and programmable logic controllers. Global supply chains and proprietary third-party hardware components, tools, and software limit the reach of static design verification techniques. As a consequence, attacks such as Stuxnet have demonstrated that these systems can be surreptitiously compromised. We are developing a run-time method for process control violation prediction to enhance system resilience against configuration attacks on embedded controllers. This approach copes with either malicious or unintentional errors in any software layer of any programmable component. The run-time system includes a second instance of the active controller connected to a model of the plant, giving a short-term projection of future controller actions and process state. To maintain convergence with the physical system, the model's state is periodically synchronized with the plant's state. The predictor is combined with run-time guards implemented in a configurable hardware-anchored root-of-trust to quickly detect when the projected process state violates specifications. Aberrant event- or time-triggered controller behavior is anticipated before it affects the physical process, allowing preemptive switchover to a minimal and static stability-preserving controller. A productive model-based design flow is being extended to synthesize the active and backup controllers, prediction module, and specification guards into a single commercially-available chip. The root-of-trust can be formally verified due to its hardware implementation and independence.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

K.G. Lyn, L.W. Lerner, C.J. McCarty, and C.D. Patterson "The Trustworthy Autonomic Interface Guardian Architecture for Cyber-Physical Systems" IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC) , 2015 , p.1803-1810 10.1109/CIT/IUCC/DASC/PICOM.2015.263

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Cyberattacks usually bring to mind cyber crime, which ultimately seeks money (e.g. ransomware), hactivism, which seeks to disrupt an entity’s IT systems, or espionage, which seeks corporate and government information.  A less frequent association is cyber conflict, which seeks to degrade or destroy physical infrastructure such as power, petrochemical, and manufacturing plants.  What was accomplished by aerial bombing campaigns in WWII can now be done by malicious code introduced through networks to the embedded computers controlling physical processes.  This type of attack has great potential for widespread economic disruption as demonstrated by the December 2015 power disruption in Ukraine that left more than 230,000 residents in the dark.  While the response to cyber crime, hactivism, and espionage is usually reactive (software patching and/or updating virus signatures), cyber warfare defenses need to be proactive since there may be nothing left to defend after the initial attack or it may not be possible to return processes to stability beyond a certain degree of disturbance.  Despite being networked, the simple microcontrollers bridging the cyber and physical worlds generally have few internal protections against malware.  Network exploits developed in the IT realm carry over to process control systems.  We therefore seek to add a last line of defense beyond conventional network protections such as firewalls.

One option, inspired by the movie Minority Report, is prediction and pre-emption.  Rather than have psychics see what will occur in the future, the physical world is mirrored by a predictive virtual world that connects a copy of the (possibly compromised) plant control software to a computer model of the physical plant.  The virtual world can be fast forwarded to see what latent malware in the microcontroller may attempt to do in the near future.  Even a short preview may help to avoid process instability and permit an orderly transfer to a simple, trusted backup controller.  A second option is to use machine learning to classify the possible states of the plant into safe and unsafe states.  When the classifier detects the plant moving into an unsafe region it assumes that the controller has been compromised and transitions to the trusted backup controller.  In both options, it is important that the monitoring, prediction, switchover, and backup components be isolated from any and all microcontroller software, which is accomplished by using programmable system-on-chip platforms that integrate microcontrollers and configurable hardware on the same chip.  The configurable hardware, which cannot be modified over the network, implements the trusted components.

In the cybersecurity realm, workforce education is as important as technical solutions.  Designing protections for cyber-physical systems requires a knowledge of two fields that traditionally have little intersection: network security, which is traditionally associated with computer engineering and computer science programs, and control system engineering, which is normally part of electrical, mechanical, and aerospace engineering programs.  Lab modules created in this project incorporate cyber-physical security concepts into learning modules that highlight real-world technical issues.  This approach helps students understand control system architectures and their vulnerabilities to cyber-attacks via experiential learning, and acquire practical skills through actively participating in the hands-on exercises.  The goal of these lab modules is to show how an adversary could destabilize a computer-controlled process by exploiting vulnerabilities in network, supervisory, and process controller layers.  A mock testbed environment is created with low cost commercial-off-the-shelf hardware suiting undergraduate embedded system, control system design, or cybersecurity courses.  The ultimate goal is to have students appreciate the awesome responsibilities of embedded microcontrollers.


Last Modified: 09/20/2016
Modified by: Cameron D Patterson

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page