HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Abstract : Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the integrity of execution targets. A TC architecture can be combined with a real-time access control system to help protect against real-time availability and malware threats. However TC architectures offer only static (load-time) protection, so it is still necessary to address the possibility of run-time (execution) attacks. This paper focuses on the protection afforded by TC platforms to critical infrastructure assets. The paper defines a threat model, analyzes vulnerabilities, proposes services and tools that guarantee real-time availability with integrity, and demonstrates how they can be used to protect communications of an IEC61850-90-5-compliant substation automation system in an electricity grid. Also, it discusses the impact of run-time attacks on TC-compliant critical infrastructure assets.
Document type :
Conference papers
Complete list of metadata

Cited literature [21 references]  Display  Hide  Download

https://hal.inria.fr/hal-01456895
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, February 6, 2017 - 9:45:51 AM
Last modification on : Friday, May 21, 2021 - 6:38:02 PM
Long-term archiving on: : Sunday, May 7, 2017 - 12:31:47 PM

File

978-3-642-45330-4_7_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Jonathan Jenkins, Mike Burmester. Protecting Infrastructure Assets from Real-Time and Run-Time Threats. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.97-110, ⟨10.1007/978-3-642-45330-4_7⟩. ⟨hal-01456895⟩

Share

Metrics

Record views

39

Files downloads

69