|POGLIANI MARCELLO||Cycle: XXXI |
Section: Computer Science and Engineering
Tutor: BONARINI ANDREA Major Research topic
:Security of Industrial Control Systems: a real-world perspective
Advisor: ZANERO STEFANOAbstract:
Industrial Control Systems (ICS) are a central component of modern factories and critical infrastructures alike. Although most ICS have been originally developed as isolated entities, nowadays they are often distributed and connected with external systems, corporate networks and, ultimately, the Internet. The growing interconnection is motivated by the convenience of remotely controlling complex critical infrastructures, as well as phenomena such as the Industry 4.0, and the emergency of distributed (smart) power grids.
Interconnecting ICS raises practical security concerns: indeed, the existence of malware such as Stuxnet - which in 2010 targeted Iranian uranium enrichment plants - proves that ICS are a real target for motivated and sophisticated threat actors. In fact, ICS play an ever increasing role in the critical infrastructure of every country: their compromise can paralyze the production of factories, bring economic damage, provoke physical harm, and disrupt key infrastructures such as the power grid. Unfortunately, while the ICS industry is extremely concerned with safety issues, it is lacking in terms of security, i.e., resilience to an adversary willing to compromise or destroy the system on purpose.
In this research, we aim to perform a comprehensive analysis of the ICS threat landscape First, we to analyze the security of industrial control systems, understanding the main vulnerability classes affecting them, with a specific focus on the emerging class of vulnerabilities at the cyber-physical interfaces. Second, we analyze if and how ICS vulnerabilities are exploited in the wild. To enable those analyses, we also need to tackle challenges such as the lack of a reliable dataset of attacks, and to develop tools to ease the security analysis and assessment of ICS. Finally, we want to propose countermeasures allowing to effectively build a security-aware ICS architecture.