Skip to main content

2020 | OriginalPaper | Buchkapitel

4. Data-Driven Defense Through Leakage Minimization

verfasst von : Sujit Rokka Chhetri, Mohammad Abdullah Al Faruque

Erschienen in: Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Part I of this book, we presented data-driven attack models capable of breaching the confidentiality of the system. In this form of attacks, attackers utilize the side-channels (such as acoustics, power, electromagnetic emissions, and so on) in the physical domain to estimate and steal cyber-domain data (such as G/M-codes). Since these emissions depend on the physical structure of the system, one way to minimize the information leakage is to modify the physical domain. However, this process can be costly due to added hardware modification. Instead, in this chapter we present a novel methodology that allows the cyber-domain tools [such as computer-aided manufacturing (CAM)] to be aware of the existing information leakage. We will demonstrate how by changing either machine process or product design parameters in the cyber-domain, we can minimize the information leakage. The methodology presented in this chapter aids the existing cyber-domain and physical domain security solution by utilizing the cross-domain relationship.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hojjati, A., Adhikari, A., et al. (2016) Leave your phone at the door: Side channels that reveal factory floor secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. Hojjati, A., Adhikari, A., et al. (2016) Leave your phone at the door: Side channels that reveal factory floor secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM.
2.
Zurück zum Zitat Al Faruque, M. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway: IEEE. Al Faruque, M. A., Chhetri, S. R., et al. (2016). Acoustic side-channel attacks on additive manufacturing systems. In International Conference on Cyber-Physical Systems (ICCPS). Piscataway: IEEE.
3.
Zurück zum Zitat Chhetri, S. R., et al. (2017). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3MathSciNet Chhetri, S. R., et al. (2017). Confidentiality breach through acoustic side-channel in cyber-physical additive manufacturing systems. ACM Transaction on Cyber-Physical Systems, 2(1), 3MathSciNet
4.
Zurück zum Zitat Yampolskiy, M., Andel, T. R., et al. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. New York: ACM. Yampolskiy, M., Andel, T. R., et al. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. New York: ACM.
5.
Zurück zum Zitat Straub, J. (2017). Identifying positioning-based attacks against 3D printed objects and the 3D printing process. In SPIE Defense+ Security. International Society for Optics and Photonics. Straub, J. (2017). Identifying positioning-based attacks against 3D printed objects and the 3D printing process. In SPIE Defense+ Security. International Society for Optics and Photonics.
6.
Zurück zum Zitat Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. New York: ACM. Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. New York: ACM.
7.
Zurück zum Zitat Belikovetsky, S., Solewicz, Y., et al. (2017). Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint:1705.06454. Belikovetsky, S., Solewicz, Y., et al. (2017). Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint:1705.06454.
8.
Zurück zum Zitat Tsoutsos, N. G., Gamil, H., & Maniatakos, M. (2017). Secure 3D printing: Reconstructing and validating solid geometries using toolpath reverse engineering. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security. New York: ACM. Tsoutsos, N. G., Gamil, H., & Maniatakos, M. (2017). Secure 3D printing: Reconstructing and validating solid geometries using toolpath reverse engineering. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security. New York: ACM.
10.
Zurück zum Zitat Chen, F., Mac, G., & Gupta, N. (2017). Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Materials & Design, 128, 182–194.CrossRef Chen, F., Mac, G., & Gupta, N. (2017). Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Materials & Design, 128, 182–194.CrossRef
11.
Zurück zum Zitat Gupta, N., Chen, F., et al. (2017). ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting. In Proceedings of the 54th Annual Design Automation Conference 2017. New York: ACM. Gupta, N., Chen, F., et al. (2017). ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting. In Proceedings of the 54th Annual Design Automation Conference 2017. New York: ACM.
13.
Zurück zum Zitat Jamieson, R., & Hacker, H. (1995). Direct slicing of CAD models for rapid prototyping. Rapid Prototyping Journal, 1(2), 4–12.CrossRef Jamieson, R., & Hacker, H. (1995). Direct slicing of CAD models for rapid prototyping. Rapid Prototyping Journal, 1(2), 4–12.CrossRef
14.
Zurück zum Zitat Jin, G. Q., Li, W. D., et al. (2011). Adaptive tool-path generation of rapid prototyping for complex product models. Journal of manufacturing systems, 30(3), 154–164.CrossRef Jin, G. Q., Li, W. D., et al. (2011). Adaptive tool-path generation of rapid prototyping for complex product models. Journal of manufacturing systems, 30(3), 154–164.CrossRef
15.
Zurück zum Zitat Yang, W., Zhou, Y., et al. (2017). Multi-channel fusion attacks. IEEE Transactions on Information Forensics and Security, 12(8), 1757–1771.CrossRef Yang, W., Zhou, Y., et al. (2017). Multi-channel fusion attacks. IEEE Transactions on Information Forensics and Security, 12(8), 1757–1771.CrossRef
16.
Zurück zum Zitat Mativo, T., Fritz, C., & Fidan, I. (2018). Cyber acoustic analysis of additively manufactured objects. The International Journal of Advanced Manufacturing Technology, 96(1–4), 581–586.CrossRef Mativo, T., Fritz, C., & Fidan, I. (2018). Cyber acoustic analysis of additively manufactured objects. The International Journal of Advanced Manufacturing Technology, 96(1–4), 581–586.CrossRef
17.
Zurück zum Zitat Veyrat-Charvillon, N., & Standaert, F.-X. (2009). Mutual information analysis: How, when and why?. In CHES (Vol. 5747, pp. 429–443). Berlin: Springer. Veyrat-Charvillon, N., & Standaert, F.-X. (2009). Mutual information analysis: How, when and why?. In CHES (Vol. 5747, pp. 429–443). Berlin: Springer.
18.
Zurück zum Zitat Chhetri, S. R., Faezi, S., & Al Faruque, M. A. (2017). Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In 2017 Design, Automation and Test in Europe Conference and Exhibition (DATE). Piscataway: IEEE. Chhetri, S. R., Faezi, S., & Al Faruque, M. A. (2017). Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In 2017 Design, Automation and Test in Europe Conference and Exhibition (DATE). Piscataway: IEEE.
19.
Zurück zum Zitat Kramer, T. R., Proctor, F. M., et al. (2000). The NIST RS274NGC interpreter-version 3 (Vol. 5416). NISTIR. Kramer, T. R., Proctor, F. M., et al. (2000). The NIST RS274NGC interpreter-version 3 (Vol. 5416). NISTIR.
21.
Zurück zum Zitat Drumm, B. (2011). Printrbot: Your first 3D printer. Retrieved November, 26 (2013). Drumm, B. (2011). Printrbot: Your first 3D printer. Retrieved November, 26 (2013).
22.
Zurück zum Zitat AT2021 (2016). Cardioid Condenser Microphone. Audio-Technica. AT2021 (2016). Cardioid Condenser Microphone. Audio-Technica.
Metadaten
Titel
Data-Driven Defense Through Leakage Minimization
verfasst von
Sujit Rokka Chhetri
Mohammad Abdullah Al Faruque
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37962-9_4

Neuer Inhalt