(2022) Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
|
Text
OPC_UA.pdf Download (925kB) | Preview |
Abstract
The OPC UA protocol is an upcoming de-facto standard for building Industry 4.0 processes in Europe, and one of the few industrial protocols that promises security features to prevent attackers from manipulating and damaging critical infrastructures. Despite the importance of the protocol, challenges in the adoption of OPC UA's security features by product vendors, libraries implementing the standard, and end-users were not investigated so far. In this work, we systematically investigate 48 publicly available artifacts consisting of products and libraries for OPC UA and show that 38 out of the 48 artifacts have one (or more) security issues. We show that 7 OPC UA artifacts do not support the security features of the protocol at all. In addition, 31 artifacts that partially feature OPC UA security rely on incomplete libraries and come with misleading instructions. Consequently, relying on those products and libraries will result in vulnerable implementations of OPC UA security features. To verify our analysis, we design, implement, and demonstrate attacks in which the attacker can steal credentials exchanged between victims, eavesdrop on process information, manipulate the physical process through sensor values and actuator commands, and prevent the detection of anomalies.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Nils Ole Tippenhauer (SCy-Phy) |
Conference: | UNSPECIFIED |
Depositing User: | Alessandro Erba |
Date Deposited: | 23 Sep 2022 09:39 |
Last Modified: | 23 Sep 2022 09:39 |
Primary Research Area: | NRA3: Threat Detection and Defenses |
URI: | https://publications.cispa.saarland/id/eprint/3789 |
Actions
Actions (login required)
View Item |