期刊文献+

基于口令认证机制的PLC脆弱性分析技术研究

Research on Vulnerability Analysis Techniques for PLC Based on Password Authentication Mechanism
下载PDF
导出
摘要 随着工业4.0时代的到来,越来越多的工控设备因为现实需要开始接入工业互联网,这在提高生产力、带来经济效益的同时也引发了安全问题。原本这些应用于工厂内网的工控设备,在设计之初没有过多考虑信息安全。因此,这些工控设备安全性较弱,攻击难度较低,一旦被攻击者攻击成功,轻则中断工业生产流程带来经济损失,重则造成严重人员伤亡。因此,如何发现工控设备存在的安全漏洞并进行加固,成为安全研究人员的研究热点。本文以一款国外厂商的PLC为例,通过分析该款PLC口令认证流程,揭露了口令认证绕过漏洞原理,并给出了相应攻击利用方法,最后以防御者的角度给出了针对此类漏洞的加固方法,从而帮助厂商提高PLC的安全性。 With the advent of Industry 4.0,an increasing number of industrial control devices are being connected to the industrial internet due to practical needs.While this improves productivity and brings economic benefits,it also introduces security issues.These industrial control devices,originally designed for internal factory networks,did not consider information security issues during their design phase.Therefore,these devices have weak security and low attack difficulty.Once successfully attacked,they can cause economic losses by interrupting industrial production processes,or even result in serious casualties.Therefore,discovering and strengthening security vulnerabilities in industrial control devices has become a hot research topic for security researchers.This article uses a PLC from a foreign manufacturer as an example to analyze the password authentication process and reveal the principle of password authentication bypass vulnerabilities.Corresponding attack methods are also provided,and finally,from the defender’s perspective,methods for mitigating such vulnerabilities are proposed to help manufacturers improve the security of their PLCs.
作者 车欣 张妍 汪慕峰 Che Xin;Zhang Yan;Wang Mufeng(College of Control Science and Engineering,Zhejiang University,Hangzhou Zhejiang,310007;China Industrial Control Systems Cyber Emergency Response Team,Beijing,100040)
出处 《工业信息安全》 2023年第3期47-53,共7页 Industry Information Security
关键词 可编程逻辑控制器 漏洞分析 口令认证 Programmable Logic Controllers Vulnerability Analysis Password Authenticatio
  • 相关文献

参考文献2

二级参考文献6

  • 1David Helan. Stuxnet: analysis,myths and realities [J].Actusecu 27,2010:14-23. 被引量:1
  • 2Amr Thabet.Stuxnet_Malware_Analysis_Paper[J].Freelancer Malware Researcher, 2010: 3-28. 被引量:1
  • 3Nicolas Falliere, Liam O Murchu, Eric Chien.W32.Stuxnet Dossier[R]. Symantec company, 2011.16-38. 被引量:1
  • 4Matrosov, Rodionov.StuxnetZUnder the Microscope 1.3[R]. ESET Company, 2010.24-65,. 被引量:1
  • 5Mark Russinovich. Analyzing a Stuxnet Infection with the Sysintemals Tool[EB/OL]. http://blogs.technet.com/b/markrussinovich/archive/2011 /03/30/3416253.aspx, 2010. 被引量:1
  • 6安天实验室对Stuxnet蠕虫攻击工业控制系统事件的综合报告[R].安全实验室,2010.4-11. 被引量:1

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部