Event Title
Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems
Location
Huntsville (Ala.)
Start Date
6-7-2017
Presentation Type
Paper
Description
Supervisory Control And Data Acquisition (SCADA) systems are the primary technology used to automate our critical infrastructure and major industries in order to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can be appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware threats are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. In this work, we propose a virtual experimental platform to study the effect of one such vulnerability, called hardware Trojans, on SCADA systems. Through this platform, a comprehensive run time analysis of hardware Trojan is accomplished and we show that even a timelimited attack can lead to destabilization of the SCADA system causing hazardous conditions. We demonstrate our platform using a virtual gas pipeline SCADA model.
Recommended Citation
Gunti, Nagendra Babu; Lingasubramanian, Karthikeyan; Alves, Thiago; Das, Rishabh; and Morris, Thomas, "Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems" (2017). National Cyber Summit. 3.
https://louis.uah.edu/cyber-summit/ncs2017/ncs2017papers/3
Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems
Huntsville (Ala.)
Supervisory Control And Data Acquisition (SCADA) systems are the primary technology used to automate our critical infrastructure and major industries in order to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can be appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware threats are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. In this work, we propose a virtual experimental platform to study the effect of one such vulnerability, called hardware Trojans, on SCADA systems. Through this platform, a comprehensive run time analysis of hardware Trojan is accomplished and we show that even a timelimited attack can lead to destabilization of the SCADA system causing hazardous conditions. We demonstrate our platform using a virtual gas pipeline SCADA model.