1,853 research outputs found

    VERIFICATION AND DEBUG TECHNIQUES FOR INTEGRATED CIRCUIT DESIGNS

    Get PDF
    Verification and debug of integrated circuits for embedded applications has grown in importance as the complexity in function has increased dramatically over time. Various modeling and debugging techniques have been developed to overcome the overwhelming challenge. This thesis attempts to address verification and debug methods by presenting an accurate C model at the bit and algorithm level coupled with an implemented Hardware Description Language (HDL). Key concepts such as common signal and variable naming conventions are incorporated as well as a stepping function within the implemented HDL. Additionally, a common interface between low-level drivers and C models is presented for early firmware development and system debug. Finally, selfchecking verification is discussed for delivering multiple test cases along with testbench portability

    Ghost in the PLC vs GhostBuster:on the feasibility of detecting pin control attack in Programmable Logic Controllers

    Get PDF
    Programmable Logic Controllers (PLCs) are a family of embedded devices used for physical process control. Similar to other embedded devices, PLCs are vulnerable to cyber attacks. Because they are used to control the physical processes of critical infrastructures, compromised PLCs constitute a significant security and safety risk. Previously we introduced specific attack against PLCs which can stealthily manipulate the physical process it controls by tampering with the device I/O at a low level. We implemented different variants of the attack in the form of a rootkit and a user-space malicious code over a candidate PLC. We then move forward with a tailored defense which specifically detect modification of PLCs I/O to detect our attack

    Intel Galileo and Intel Galileo Gen 2

    Get PDF
    Computer scienc

    Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers

    Get PDF
    Recent attacks on industrial control systems (ICSs), like the highly publicized Stuxnet malware, have perpetuated a race to the bottom where lower level attacks have a tactical advantage. Programmable logic controller (PLC) firmware, which provides a software-driven interface between system inputs and physically manifested outputs, is readily open to modification at the user level. Current efforts to protect against firmware attacks are hindered by a lack of prerequisite research regarding details of attack development and implementation. In order to obtain a more complete understanding of the threats posed by PLC firmware counterfeiting and the feasibility of such attacks, this research explores the vulnerability of common controllers to intentional firmware modifications. After presenting a general analysis process that takes advantage of various techniques and methodologies applied to similar scenarios, this work derives the firmware update validation method used for the Allen-Bradley ControlLogix PLC. A proof of concept demonstrates how to alter a legitimate firmware update and successfully upload it to a ControlLogix L61. Possible mitigation strategies discussed include digitally signed and encrypted firmware as well as preemptive and post-mortem analysis methods to provide protection. Results of this effort facilitate future research in PLC firmware security through direct example of firmware counterfeiting

    Power utility remote device communications using a Low Power Wide Area Network (LPWAN) based on the LoRa communications standard

    Get PDF
    Electricity distributors currently face heavily reduced operating and capital investment budgets in an effort to reduce household power bills. With the predicated high growth rate of the Internet of Things the following project has researched the possibility of sing this wireless technology for use in an electrical distribution network. The low cost and long range ability of LoRaWAN system provides numerous opportunities to provide distributors and customer’s information about power usage as well as provide access to once un‐financially viable communications. The project researches the LoRaWAN specification and where the technology currently sits in Australia. It will define possible uses for the technology in the electrical distribution industry and also examine the types of devices to establish a LoRaWAN network. Most of the objects and devices that will connect to the LoRaWAN network will only require low data rates/response times and small packet data. After conducting a literature review which details the LoRaWAN specification, LoRa modulation techniques and system architecture the project methodology then identified possible devices to use for the design and implementation of a LoRaWAN network. Theoretical analysis of coverage plots and expected range was completed which was then used for testing the live system. Lab testing of the LoRaWAN system was completed together with line of sight drive testing using various data rates in urban and rural environments. Data rates were chosen from some typical devices that may be used in the network such as smart meters. The system functioned in line of sight applications as specified with objects having a range of 20km. Lastly limitations and recommendations have been made for the system to be used in a real life application

    Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode

    Get PDF
    Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria ModepublishedVersio
    corecore