Skip to main content
Top
Published in: World Wide Web 1/2018

14-04-2017

IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT

Authors: Letian Sha, Fu Xiao, Wei Chen, Jing Sun

Published in: World Wide Web | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With Industry 4.0 and Internet of Things (IoT) era coming, remote passwords and control-flow vulnerabilities play a key role to detect attackers in Industry IoT (IIoT), who can easily complete remote session and control-flow hijacking on leverage of these types of Sensitive Information (SI). However, how to measure security degree of Sensitive Information is an open issue. To our best knowledge, no effective method can detect secret trace of SI thieves in Advanced Persistent Threat (APT), especially for backdoors and vulnerabilities in software or firmware. To deal with these problems, we propose a new design, called, IIoT-SIDefender (IIoT-SID), we measure security degree of Sensitive Information via Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS), based on selected taint tracking and real-time memory modification, attack-defense and fix-distribution approaches are proposed. Until now, it is the first defined SI guard method to detect SI-leakage scenarios and reject SI-leverage attack. To verify our proposal, experimental tests are verified in a large number of IIoT applications and devices, including IP cameras, smart meters, PLCs and smart routers. Test results have demonstrated that we can capture security level for Sensitive Information as expected, detect potential leakage points in data lifetime (including unknown backdoors and vulnerabilities), describe fine-grained semantics of accidental leakage and secret leverage points, and generate relative hot fix to prevent further attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Apa, L., Penagos, C.M.: Compromising industrial facilities from 40 miles away. BlackHat (2013) Apa, L., Penagos, C.M.: Compromising industrial facilities from 40 miles away. BlackHat (2013)
2.
go back to reference Ariu, D., Tronci, R., Giacinto, G.: HMMPayl : an intrusion detection system based on hidden Markov models. Computers & Security. 30(4), 221–241 (2011)CrossRef Ariu, D., Tronci, R., Giacinto, G.: HMMPayl : an intrusion detection system based on hidden Markov models. Computers & Security. 30(4), 221–241 (2011)CrossRef
5.
go back to reference Cai Z, He Z, Guan X, et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. 2016, PP(99):1–1. Cai Z, He Z, Guan X, et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. 2016, PP(99):1–1.
6.
go back to reference Chen, D.D., Manuel, E., Maverick, W., David, B.: Towards automated dynamic analysis for Linux-based embedded firmware[C]// network and distributed system security Symposium (2016) Chen, D.D., Manuel, E., Maverick, W., David, B.: Towards automated dynamic analysis for Linux-based embedded firmware[C]// network and distributed system security Symposium (2016)
8.
go back to reference Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection[J]. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)CrossRef Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection[J]. IEEE Trans. Softw. Eng. 28(8), 735–746 (2002)CrossRef
9.
go back to reference Costin, A., Zaddach, J.: Embedded devices security and firmware reverse engineering. BlackHat (2013) Costin, A., Zaddach, J.: Embedded devices security and firmware reverse engineering. BlackHat (2013)
10.
go back to reference Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: Proceedings of the 23rd USENIX Security Symposium. USENIX, pp. 95–110 (2014) Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: Proceedings of the 23rd USENIX Security Symposium. USENIX, pp. 95–110 (2014)
11.
go back to reference Costin, A., Zarras, A., Francillon, A., et al.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces[C]// ACM on Asia Conference on computer and communications security. ACM (2016) Costin, A., Zarras, A., Francillon, A., et al.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces[C]// ACM on Asia Conference on computer and communications security. ACM (2016)
12.
go back to reference David, Z., Jaeyeon, J., Dawn, S., et al.: TaintEraser: Protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS operation systems Review. ACM: New York. 45(1), 142–154 (2011) David, Z., Jaeyeon, J., Dawn, S., et al.: TaintEraser: Protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS operation systems Review. ACM: New York. 45(1), 142–154 (2011)
13.
go back to reference Davis, A.: Broadcasting your attack: security Testing DAB Radio in Cars. BlackHat (2015) Davis, A.: Broadcasting your attack: security Testing DAB Radio in Cars. BlackHat (2015)
14.
go back to reference Dong, M., Ota, K., Yang, L.T., et al.: LSCD: a low-storage clone detection protocol for cyber-physical systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 35(5), 712–723 (2016)CrossRef Dong, M., Ota, K., Yang, L.T., et al.: LSCD: a low-storage clone detection protocol for cyber-physical systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 35(5), 712–723 (2016)CrossRef
15.
go back to reference Garfinkel T, Pfaff B, Chow J, et al. Data life time is a systems problem. Proc of the 11th workshop on ACM SIGOPS european workshop. ACM: N. Y., 64–75 (2004) Garfinkel T, Pfaff B, Chow J, et al. Data life time is a systems problem. Proc of the 11th workshop on ACM SIGOPS european workshop. ACM: N. Y., 64–75 (2004)
18.
go back to reference Hu, Y., Dong, M., Ota, K., et al.: Mobile target detection in Wireless sensor Networks with adjustable sensing frequency. IEEE Syst. J. 10(25), 3641–3642 (2014) Hu, Y., Dong, M., Ota, K., et al.: Mobile target detection in Wireless sensor Networks with adjustable sensing frequency. IEEE Syst. J. 10(25), 3641–3642 (2014)
19.
go back to reference Jim, C., Ben, P., Tal, G., et al.: Shredding your garbage: reducing data lifetime through secure deallocation. Proc of the 14th USENIX security Symp. ACM. N. Y. 104–118 (2005) Jim, C., Ben, P., Tal, G., et al.: Shredding your garbage: reducing data lifetime through secure deallocation. Proc of the 14th USENIX security Symp. ACM. N. Y. 104–118 (2005)
20.
go back to reference Lin, Y., Lee, P.-C., Tapeng, C., et al.: Multi-attribute group decISIon making model under the condition of uncertain information. Automation in Construction. Elsevier:Amsterdam. 17(1), 792–797 (2008) Lin, Y., Lee, P.-C., Tapeng, C., et al.: Multi-attribute group decISIon making model under the condition of uncertain information. Automation in Construction. Elsevier:Amsterdam. 17(1), 792–797 (2008)
21.
go back to reference Maskiewicz, J., Ellis, B., Mouradian, J., Shacham, H.: Mouse trap: exploiting firmware updates in USB peripherals. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies. USENIX, pp. 1–10 (2014) Maskiewicz, J., Ellis, B., Mouradian, J., Shacham, H.: Mouse trap: exploiting firmware updates in USB peripherals. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies. USENIX, pp. 1–10 (2014)
22.
go back to reference Matt, W., Sudhir, A., Michael, C., et al.: Testing metrics for password creation policies by attacking large sets of revealed passwords. Proc of the 17th ACM Conf on computer and communications security. ACM: New York. 162–175 (2010) Matt, W., Sudhir, A., Michael, C., et al.: Testing metrics for password creation policies by attacking large sets of revealed passwords. Proc of the 17th ACM Conf on computer and communications security. ACM: New York. 162–175 (2010)
23.
go back to reference Neisse, R., Steri, G., Fovino, I.N., et al.: SecKit: a model-based security toolkit for the Internet of Things. Comput. Secur. 58, 78–87 (2015) Neisse, R., Steri, G., Fovino, I.N., et al.: SecKit: a model-based security toolkit for the Internet of Things. Comput. Secur. 58, 78–87 (2015)
24.
go back to reference Ooi, S.T., Lorber, B.: Avatar: a framework to support dynamic security analysis of embedded systems’ Firmwares[C]// network and distributed system security Symposium (2014) Ooi, S.T., Lorber, B.: Avatar: a framework to support dynamic security analysis of embedded systems’ Firmwares[C]// network and distributed system security Symposium (2014)
28.
go back to reference Rezvani, M., Ignjatovic, A., Bertino, E., et al.: Secure data aggregation Technique for Wireless sensor Networks in the presence of collusion attacks. Dependable & Secure Computing IEEE Transactions on. 12(1), 98–110 (2015)CrossRef Rezvani, M., Ignjatovic, A., Bertino, E., et al.: Secure data aggregation Technique for Wireless sensor Networks in the presence of collusion attacks. Dependable & Secure Computing IEEE Transactions on. 12(1), 98–110 (2015)CrossRef
29.
go back to reference Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the Internet of Things: a context-aware and multi-service approach. Comput. Secur. 39(39), 351–365 (2013)CrossRef Saied, Y.B., Olivereau, A., Zeghlache, D., et al.: Trust management system design for the Internet of Things: a context-aware and multi-service approach. Comput. Secur. 39(39), 351–365 (2013)CrossRef
30.
go back to reference Santamarta, R.: SI labs: here be backdoors: a journey into the secrets of industrial firmware. BlackHat. (2012) Santamarta, R.: SI labs: here be backdoors: a journey into the secrets of industrial firmware. BlackHat. (2012)
32.
go back to reference Schwartke, H., Brüggemann, M.: PLC-blaster: a worm living solely in the PLC. BlackHat (2016) Schwartke, H., Brüggemann, M.: PLC-blaster: a worm living solely in the PLC. BlackHat (2016)
33.
go back to reference Shih, H.-S., Shyur, H.-J., Lee, E.-S.: An extension of TOPSIS for group decISIon making. Mathematical and Computer Modelling, Elsevier:Amsterdam. 45(7), 801–813 (2007)CrossRefMATH Shih, H.-S., Shyur, H.-J., Lee, E.-S.: An extension of TOPSIS for group decISIon making. Mathematical and Computer Modelling, Elsevier:Amsterdam. 45(7), 801–813 (2007)CrossRefMATH
34.
go back to reference Shu, X., Zhang, J., Yao, D.D., et al.: Fast detection of transformed data leaks. IEEE Transactions on Information Forensics & Security. 11(3), 528–542 (2016)CrossRef Shu, X., Zhang, J., Yao, D.D., et al.: Fast detection of transformed data leaks. IEEE Transactions on Information Forensics & Security. 11(3), 528–542 (2016)CrossRef
35.
go back to reference Thomas, O.: Advanced IC reverse engineering techniques: in depth analysis of a modern smart card. BlackHat (2015) Thomas, O.: Advanced IC reverse engineering techniques: in depth analysis of a modern smart card. BlackHat (2015)
36.
go back to reference Tone K, Manabe R. The casebook of AHP. JUSE Publishing Company: Tokyo, (1990) Tone K, Manabe R. The casebook of AHP. JUSE Publishing Company: Tokyo, (1990)
37.
go back to reference Trendmicro: havex-targets-industrial-control-systems [EB/OL] havex-targets-industrial-control-systems Trendmicro: havex-targets-industrial-control-systems [EB/OL] havex-targets-industrial-control-systems
39.
go back to reference Wang, T., Wei, T., Lin, Z., Zou, W.: IntScope: automatically detecting integer overflow vulnerability in X86 binary using symbolic execution. In: Proceedings of the 16th Annual Networkand Distributed System Security Symposium (NDSS’09) (2009) Wang, T., Wei, T., Lin, Z., Zou, W.: IntScope: automatically detecting integer overflow vulnerability in X86 binary using symbolic execution. In: Proceedings of the 16th Annual Networkand Distributed System Security Symposium (NDSS’09) (2009)
40.
go back to reference Weinmann, R.-P.; Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. In: Proceedings of the 6th USENIX Workshop on Offensive Technologies. USENIX, pp. 1–10, (2012) Weinmann, R.-P.; Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. In: Proceedings of the 6th USENIX Workshop on Offensive Technologies. USENIX, pp. 1–10, (2012)
44.
go back to reference Wu, Y., Fahmy, S., Shroff, N.B: On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm[C]// INFOCOM 2008. The Conference on Computer Communications. IEEE. IEEE, pp. 356–360 (2008) Wu, Y., Fahmy, S., Shroff, N.B: On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm[C]// INFOCOM 2008. The Conference on Computer Communications. IEEE. IEEE, pp. 356–360 (2008)
45.
go back to reference Wu, J., Dong, M., Ota, K., et al.: Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Networking and Applications. 8(6), 1133–1142 (2014)CrossRef Wu, J., Dong, M., Ota, K., et al.: Securing distributed storage for social Internet of Things using regenerating code and Blom key agreement. Peer-to-Peer Networking and Applications. 8(6), 1133–1142 (2014)CrossRef
46.
go back to reference Yinqiang, Z Fabian M, Michael K, et al. The security of modern password expiration: an algorithmic framework and empirical analysis. Proc of the 17th ACM Conf on computer and communications security. ACM: N. Y., 2010; 176–186 Yinqiang, Z Fabian M, Michael K, et al. The security of modern password expiration: an algorithmic framework and empirical analysis. Proc of the 17th ACM Conf on computer and communications security. ACM: N. Y., 2010; 176–186
47.
go back to reference Zhang, C., Wag, T., Wei, T., Zou, W.: IntPatch: Automatically Fix Integer Overflow to Buffer Overflow Vulnerability at Compile Time. European Symposium on Research in Computer Security (ESORICS’10) (2010) Zhang, C., Wag, T., Wei, T., Zou, W.: IntPatch: Automatically Fix Integer Overflow to Buffer Overflow Vulnerability at Compile Time. European Symposium on Research in Computer Security (ESORICS’10) (2010)
48.
go back to reference Zhao, Q., Cao, T.: Collecting sensitive information from windows physical memory. Journal of Computers January, ACM: New York. 4(1), 3–10 (2009) Zhao, Q., Cao, T.: Collecting sensitive information from windows physical memory. Journal of Computers January, ACM: New York. 4(1), 3–10 (2009)
Metadata
Title
IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT
Authors
Letian Sha
Fu Xiao
Wei Chen
Jing Sun
Publication date
14-04-2017
Publisher
Springer US
Published in
World Wide Web / Issue 1/2018
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0459-8

Other articles of this Issue 1/2018

World Wide Web 1/2018 Go to the issue

Premium Partner