1

FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers

Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle

White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems

Anomaly detection for cyber-physical systems is an effective method to detect ongoing process anomalies caused by an attacker. Recently, a number of anomaly detection techniques were proposed (e.g., ML based, invariant rule based, control theoretical). Little is known about the resilience of those anomaly detectors against attackers that conceal their attacks to evade detection. In particular, their resilience against white-box concealment attacks has so far only been investigated for the subset of neural network-based detectors. In this work, we demonstrate for the first time that white-box concealment attacks can also be applied to detectors that are not based on neural network solutions. In order to achieve this, we propose a generic white-box attack that evades anomaly detectors and can be adapted even if the target detection technique does not optimize a loss function. We design and implement a framework to perform our attacks, and test it on several detectors from related work. Our results show that it is possible to completely evade a wide range of detectors (based on diverse detection techniques) while reducing the number of samples that need to be manipulated (compared to prior black-box concealment attacks).

Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring

Physical side-channel monitoring leverages the physical phenomena produced by a microcontroller (e.g. power consumption or electromagnetic radiation) to monitor program execution for malicious behavior. As such, it offers a promising intrusion detection solution for resource-constrained embedded systems, which are incompatible with conventional security measures. This method is especially relevant in safety and security-critical embedded systems such as in industrial control systems. Side-channel monitoring poses unique challenges for would-be attackers, such as: (1) limiting attack vectors by being physically isolated from the monitored system, (2) monitoring immutable physical side channels with uninterpretable data-driven models, and (3) being specifically trained for the architectures and programs on which they are applied to. As a result, physical side-channel monitors are conventionally believed to provide a high level of security. In this paper, we propose a novel attack to illustrate that, despite the many barriers to attack that side-channel monitoring systems create, they are still vulnerable to adversarial attacks. We present a method for crafting functional malware such that, when injected into a side-channel-monitored system, the detector is not triggered. Our experiments reveal that this attack is robust across detector models and hardware implementations. We evaluate our attack on the popular ARM microcontroller platform on several representative programs, demonstrating the feasibility of such an attack and highlighting the need for further research into side-channel monitors.

Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks

Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels

Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems

Best paper award at CPSIoTSec'22

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks