TY - GEN
T1 - Special Session
T2 - 38th IEEE International Conference on Computer Design, ICCD 2020
AU - Tychalas, Dimitrios
AU - Maniatakos, Michail
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/10
Y1 - 2020/10
N2 - Industrial Control Systems (ICS) have evolved during the last decade following a new paradigm in the fourth industrial revolution, defined by the flexibility provided from open-source software such as Embedded Linux. In the same time-span, cache side-channel attacks have been identified as a prominent threat to any kind of computer system, facilitating highly stealthy confidentiality compromising attacks that enable information exfiltration. Given their crucial position in the systems they facilitate, ICS can be exploited to extract highly sensitive information that can compromise the system itself and, by extension, the infrastructure they belong to. Thus, in this paper we will examine the threat cache side-channel attacks pose in modern ICS. We will introduce the current landscape of side-channel threats that can target processors found in ICS, the potentially vulnerable points for information extraction across an ICS system stack as well as the nature of the information itself, and discuss viable countermeasures.
AB - Industrial Control Systems (ICS) have evolved during the last decade following a new paradigm in the fourth industrial revolution, defined by the flexibility provided from open-source software such as Embedded Linux. In the same time-span, cache side-channel attacks have been identified as a prominent threat to any kind of computer system, facilitating highly stealthy confidentiality compromising attacks that enable information exfiltration. Given their crucial position in the systems they facilitate, ICS can be exploited to extract highly sensitive information that can compromise the system itself and, by extension, the infrastructure they belong to. Thus, in this paper we will examine the threat cache side-channel attacks pose in modern ICS. We will introduce the current landscape of side-channel threats that can target processors found in ICS, the potentially vulnerable points for information extraction across an ICS system stack as well as the nature of the information itself, and discuss viable countermeasures.
KW - Embedded systems security
KW - Industrial Control
KW - Side-channel attacks
UR - http://www.scopus.com/inward/record.url?scp=85098854549&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098854549&partnerID=8YFLogxK
U2 - 10.1109/ICCD50377.2020.00021
DO - 10.1109/ICCD50377.2020.00021
M3 - Conference contribution
AN - SCOPUS:85098854549
T3 - Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors
SP - 33
EP - 36
BT - Proceedings - 2020 IEEE 38th International Conference on Computer Design, ICCD 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 18 October 2020 through 21 October 2020
ER -