Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Skip to Main content Skip to Navigation
Conference papers

Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Abstract : Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the integrity of execution targets. A TC architecture can be combined with a real-time access control system to help protect against real-time availability and malware threats. However TC architectures offer only static (load-time) protection, so it is still necessary to address the possibility of run-time (execution) attacks. This paper focuses on the protection afforded by TC platforms to critical infrastructure assets. The paper defines a threat model, analyzes vulnerabilities, proposes services and tools that guarantee real-time availability with integrity, and demonstrates how they can be used to protect communications of an IEC61850-90-5-compliant substation automation system in an electricity grid. Also, it discusses the impact of run-time attacks on TC-compliant critical infrastructure assets.
Document type :
Conference papers
Complete list of metadata

Cited literature [21 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, February 6, 2017 - 9:45:51 AM
Last modification on : Friday, May 21, 2021 - 6:38:02 PM
Long-term archiving on: : Sunday, May 7, 2017 - 12:31:47 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Jonathan Jenkins, Mike Burmester. Protecting Infrastructure Assets from Real-Time and Run-Time Threats. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. pp.97-110, ⟨10.1007/978-3-642-45330-4_7⟩. ⟨hal-01456895⟩



Record views


Files downloads