Top Banner
Attacks on Three Tank System Three Tank System Testing Model-Based Security Features Experimental Platform for Model-Based Design of Embedded Systems Matt Eby, Jan Werner, Janos Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute for Software Integrated Systems, Vanderbilt University April 27, 2006 Experimental Platform Architecture System is a test bed for the Modeling and Analysis of Complex Systems (MACS) group at Vanderbilt University The three tank system was chosen as an archetypical component controlled by SCADA system Three tank systems are common in chemical processing systems Tanks 1 & 2 regulate fluid levels in Tank 3 while Tank 3 supplies fluid to some process downstream We use this system to demonstrate and test the capabilities of security measures introduced via Model- Based Design Hybrid System Dynamics 3 to 2 Tank & 3 to 1 Tank from flow - , 2 & 1 Tanks into flow - , 1,2,3 Tanks in fluid of height - 1,2,3 Tanks of e capacitanc - , , 23 13 2 1 3 2 1 3 2 1 3 23 13 3 23 2 2 13 1 1 3 2 1 X X F F ,h ,h h C C C D X X C X F C X F C dt dh dt dh dt dh 10/100BASE-T or 802.11b Plant Simulator Data Acquisition Board (DAQ) Embedded System Board Embedded System Board Embedded System Board The Data Acquisition Board interfaces plant simulation with embedded system boards The Plant Simulator acts as the physical environment in which the embedded system would run The embedded system boards run distributed control algorithms Plant Simulator Standard Desktop PC running Mathworks xPC DAQ blocks are appended to Plant Models xPC Code Generated with Real-Time Workshop Data Acquisition Board Measurement Computing PCI-DDA08/12 8 analog output channels (12 bit resolution) 48 Digital I/O Embedded System Board Micro/Sys SBC4495 Cyrix Intel 486 compatible processor 8 Analog Inputs & Outputs (14 bit resolution) 24 Digital I/O 10/100BASE-T Ethernet, 802.11b Supported OS Linux, Windows CE/98, VxWorks, LynxOS, PharLap ETS, MSDOS 5.0 Specifications Control System Security Model Embedded System Board 8 A/D Channels 24 Digital I/O Plant Simulation Simulink Models Real-Time Workshop Mathworks xPC Target Measurement Computing PCI-DDA08/12 48 Digital I/O 8 D/A Channels DSML Code Generator Embedded System Model Secure System Model Tank C ontrollernode Tank C ontrollernode W eb Server System supervisor C orporate w orkers Attacker1 Attacker2 Attacker3 Encrypted 802.11b W ireless connection The experimental platform facilitates “Hardware”-in-the-Loop testing of controllers. High fidelity plant simulations behave just as the actual physical environment would. Controllers can run on various operating systems with different security designs. Code for controllers is generated based on security models for the embedded system Picture Fill Tank 2 Source Tank 2 Source Tank 1 Fill Tank 1 Source Tank 1 Tank 3 Full Source Tank 2 Tank 3 Full (H1 > 0.7) && (RangeMid<=0.3 5) (H1 > 0.7) && (RangeMid>0.3 5 (H2 > RangeMid) (H3 > RangeMax) (H3<RangeMin) && (H1<RangeMid) (H3 < RangeMid) (H3 > RangeMax) (H3<RangeMin) && (H2<RangeMid) (H3 < RangeMid) Physical Plant Diagram drain 3 Tank - 2 & 1 Tanks ves supply val fluid - , 1,2, Tanks valves transfer fluid - , , speed pump controls - off or on pump turns - 3 2 1 3 2 1 d f f x x x HiLow OnOff Controller Outputs The experimental platform is configured for specific control problems such as a Three Tank System controlled by a SCADA system. We then test a variety of attacks against the system This allows us to exercise the code produced from the security models for: Performance overhead Strength of security for specific attacks Comparison between different operating systems Device Drivers Gentoo Linux (kernel 2.4.32) Application Code Application Code GRsecurity Extensions Embedded System Board Configuration of Experimental Platform for Three Tank Testing Normal Operation Tank 1 Tank 3 Tank 2 Under normal conditions Tank 3 will fill up then stay within a defined range (in this case 0.45 m to 0.55 m). The tanks will overflow if fluid height exceeds 0.8 m. For the tests conducted on a Three Tank Controller we are running Gentoo Linux (kernel 2.4.32) with GRsecurity extensions. GRsecurity adds 3.9% (33 kB) to the kernel footprint Performance overhead is 3.5% for non- executable memory protection GRsecurity extensions allow fine grained control over system resources I/O registers Memory Protection Inter-process Communication Unauthorized Access to I/O registers Tank 1 Tank 3 Tank 2 Unauthorized code writes to the I/O registers that are connected to the Three Tank System causing Tank 1 to overflow. FSM Diagram of Controller With I/O register protection only the tank control process has permission to write to I/O channels Model-Based approach can map desired security properties to underlying platform services such as POSIX capabilities (e.g. CAP_SYS_RAWIO) Denial of Service attack can increase execution time of tank control process Operation under normal conditions Worst case execution time = 12712 μs Mean execution time = 3123 μs Denial of Service attack on network data access component Worst case execution time = 52600 μs Mean execution time = 23200 μs DoS attacks cannot be easily prevented without support of platform services such as packet filtering.
1

Experimental Platform for Model-Based Design of Embedded Systems

Jan 03, 2016

Download

Documents

georgina-vernon

Experimental Platform for Model-Based Design of Embedded Systems. Embedded System Board. Embedded System Board. Embedded System Board. Physical Plant Diagram. Specifications. Plant Simulator Standard Desktop PC running Mathworks xPC DAQ blocks are appended to Plant Models - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Experimental Platform for Model-Based Design of Embedded Systems

Attacks on Three Tank SystemAttacks on Three Tank System

Three Tank SystemThree Tank System

Testing Model-Based Security FeaturesTesting Model-Based Security Features

Experimental Platform for Model-Based Design of Embedded Systems Matt Eby, Jan Werner, Janos Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan XueInstitute for Software Integrated Systems, Vanderbilt University

April 27, 2006

Experimental Platform ArchitectureExperimental Platform Architecture• System is a test bed for the Modeling and Analysis of Complex

Systems (MACS) group at Vanderbilt University• The three tank system was chosen as an archetypical component

controlled by SCADA system• Three tank systems are common in chemical processing systems• Tanks 1 & 2 regulate fluid levels in Tank 3 while Tank 3 supplies fluid

to some process downstream• We use this system to demonstrate and test the capabilities of

security measures introduced via Model-Based Design

Hybrid System Dynamics

3 to2Tank & 3 to1Tank from flow - ,

2& 1 Tanks into flow - ,

1,2,3 Tanksin fluid ofheight -

1,2,3 Tanks of ecapacitanc - ,,

2313

21

321

321

323133

2322

1311

3

2

1

XX

FF

,h,hh

CCC

DXXC

XFC

XFC

dtdh

dtdh

dtdh

10/100BASE-T or 802.11b

PlantSimulator

Data Acquisition Board (DAQ)

EmbeddedSystem Board

EmbeddedSystem Board

EmbeddedSystem Board

The Data Acquisition Board interfaces plant simulation with embedded system boards

The Plant Simulator acts as the physical environment in which the embedded system would run

The embedded system boards run distributed control algorithms

Plant Simulator• Standard Desktop PC running Mathworks xPC• DAQ blocks are appended to Plant Models• xPC Code Generated with Real-Time Workshop

Data Acquisition Board• Measurement Computing PCI-DDA08/12• 8 analog output channels (12 bit resolution)• 48 Digital I/O

Embedded System Board• Micro/Sys SBC4495• Cyrix Intel 486 compatible processor• 8 Analog Inputs & Outputs (14 bit resolution)• 24 Digital I/O• 10/100BASE-T Ethernet, 802.11b• Supported OS

• Linux, Windows CE/98, VxWorks, LynxOS, PharLap ETS, MSDOS 5.0

Specifications

Control System

Security Model

Embedded System Board

8 A/D Channels 24 Digital I/O

Plant Simulation

Simulink Models

Real-TimeWorkshop

Mathworks xPCTarget

Measurement ComputingPCI-DDA08/12

48 Digital I/O8 D/A Channels

DSMLCode

Generator

Embedded System Model

Secure System Model

Encrypted 802.11b Wireless connection

Tank Controller nodeTank Controller node

Web Server

System supervisor

Corporateworkers

Attacker 1

Attacker 2

Attacker 3

Encrypted 802.11b Wireless connection

• The experimental platform facilitates “Hardware”-in-the-Loop testing of controllers.

• High fidelity plant simulations behave just as the actual physical environment would.

• Controllers can run on various operating systems with different security designs.

• Code for controllers is generated based on security models for the embedded system

Picture

Fill Tank 2

SourceTank 2

SourceTank 1

Fill Tank 1

SourceTank 1

Tank 3 Full SourceTank 2

Tank 3 Full

(H1 > 0.7) && (RangeMid<=0.35)

(H1 > 0.7) && (RangeMid>0.35

(H2 > RangeMid)

(H3 > RangeMax)

(H3<RangeMin) && (H1<RangeMid)

(H3 < RangeMid)

(H3 > RangeMax)

(H3<RangeMin) && (H2<RangeMid)

(H3 < RangeMid)

Physical Plant Diagram

drain 3Tank -

2 & 1 Tanks vessupply val fluid - ,

1,2,3 Tanks valves transfer fluid - ,,

speed pump controls -

offor on pump turns-

3

21

321

d

ff

xxx

HiLow

OnOffController Outputs

• The experimental platform is configured for specific control problems such as a Three Tank System controlled by a SCADA system.

• We then test a variety of attacks against the system• This allows us to exercise the code produced from

the security models for:• Performance overhead• Strength of security for specific attacks• Comparison between different operating systems

Device Drivers

Gentoo Linux (kernel 2.4.32)

ApplicationCode

ApplicationCode

GRsecurity Extensions

Embedded System Board

Configuration of ExperimentalPlatform for Three Tank Testing

Normal OperationNormal Operation

Tank 1

Tank 3

Tank 2

Under normal conditions Tank 3 will fill up then stay within a defined range (in this case 0.45 m to 0.55 m). The tanks will overflow if fluid height exceeds 0.8 m.

• For the tests conducted on a Three Tank Controller we are running Gentoo Linux (kernel 2.4.32) with GRsecurity extensions.

• GRsecurity adds 3.9% (33 kB) to the kernel footprint • Performance overhead is 3.5% for non-executable

memory protection• GRsecurity extensions allow fine grained control

over system resources• I/O registers• Memory Protection• Inter-process Communication

Unauthorized Access to I/O registersUnauthorized Access to I/O registers

Tank 1

Tank 3

Tank 2

Unauthorized code writes to the I/O registers that are connected to the Three Tank System causing Tank 1 to overflow.

FSM Diagram of Controller

• With I/O register protection only the tank control process has permission to write to I/O channels

• Model-Based approach can map desired security properties to underlying platform services such as POSIX capabilities (e.g. CAP_SYS_RAWIO)

• Denial of Service attack can increase execution time of tank control process

• Operation under normal conditions•Worst case execution time = 12712 μs•Mean execution time = 3123 μs

• Denial of Service attack on network data access component•Worst case execution time = 52600 μs•Mean execution time = 23200 μs

• DoS attacks cannot be easily prevented without support of platform services such as packet filtering.