Protecting Infrastructure Assets from Real-Time and Run-Time Threats

Abstract : Real-time availability with integrity is a crucial security requirement for critical infrastructure assets – delays in reporting device states or computations may result in equipment damage, perhaps even catastrophic failure. However, it is also necessary to address malicious software-based threats. Trusted computing (TC) is a security paradigm that enables application platforms to enforce the integrity of execution targets. A TC architecture can be combined with a real-time access control system to help protect against real-time availability and malware threats. However TC architectures offer only static (load-time) protection, so it is still necessary to address the possibility of run-time (execution) attacks. This paper focuses on the protection afforded by TC platforms to critical infrastructure assets. The paper defines a threat model, analyzes vulnerabilities, proposes services and tools that guarantee real-time availability with integrity, and demonstrates how they can be used to protect communications of an IEC61850-90-5-compliant substation automation system in an electricity grid. Also, it discusses the impact of run-time attacks on TC-compliant critical infrastructure assets.
Type de document :
Communication dans un congrès
Jonathan Butts; Sujeet Shenoi. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-417, pp.97-110, 2013, Critical Infrastructure Protection VII. 〈10.1007/978-3-642-45330-4_7〉
Liste complète des métadonnées

Littérature citée [21 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01456895
Contributeur : Hal Ifip <>
Soumis le : lundi 6 février 2017 - 09:45:51
Dernière modification le : lundi 6 février 2017 - 09:49:06
Document(s) archivé(s) le : dimanche 7 mai 2017 - 12:31:47

Fichier

978-3-642-45330-4_7_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Jonathan Jenkins, Mike Burmester. Protecting Infrastructure Assets from Real-Time and Run-Time Threats. Jonathan Butts; Sujeet Shenoi. 7th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2013, Washington, DC, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-417, pp.97-110, 2013, Critical Infrastructure Protection VII. 〈10.1007/978-3-642-45330-4_7〉. 〈hal-01456895〉

Partager

Métriques

Consultations de la notice

41

Téléchargements de fichiers

30