Vulnerability analysis case studies of control systems human machine interfaces
<p>This dissertation describes vulnerability research in the area of critical infrastructure security. The intent of this research is to develop a set of recommendations and guidelines for improving the security of Industrial Control System (ICS) and Supervisory Control and Data Acquisition sy...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
MSSTATE
2013
|
Subjects: | |
Online Access: | http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ |
id |
ndltd-MSSTATE-oai-library.msstate.edu-etd-03192013-130105 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MSSTATE-oai-library.msstate.edu-etd-03192013-1301052015-03-17T15:54:59Z Vulnerability analysis case studies of control systems human machine interfaces McGrew, Robert Wesley Computer Science and Engineering <p>This dissertation describes vulnerability research in the area of critical infrastructure security. The intent of this research is to develop a set of recommendations and guidelines for improving the security of Industrial Control System (ICS) and Supervisory Control and Data Acquisition systems software. Specifically, this research focuses on the Human- Machine Interface (HMI) software that is used on control panel workstations.</p> <p>This document covers a brief introduction to control systems security terminology in order to define the research area, a hypothesis for the research, and a discussion of the contribution that this research will provide to the field. Previous work in the area by other researchers is summarized, followed by a description of the vulnerability research, analysis, and creation of deliverables. Technical information on the details of a number of vulnerabilities is presented for a number of HMI vulnerabilities, for which either the author has performed the analysis, or from public vulnerability disclosures where sufficient information about the vulnerabilities is available.</p> <p>Following the body of technical vulnerability information, the common features and characteristics of known vulnerabilities in HMI software are discussed, and that information is used to propose a taxonomy of HMI vulnerabilities. Such a taxonomy can be used to classify HMI vulnerabilities and organize future work on identifying and mitigating such vulnerabilities in the future.</p> <p>Finally, the contributions of this work are presented, along with a summary of areas that have been identified as interesting future work.</p> Rayford B. Vaughn Jr. David A. Dampier Mahalingam Ramkumar Thomas H. Morris MSSTATE 2013-04-23 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report. |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Computer Science and Engineering |
spellingShingle |
Computer Science and Engineering McGrew, Robert Wesley Vulnerability analysis case studies of control systems human machine interfaces |
description |
<p>This dissertation describes vulnerability research in the area of critical infrastructure
security. The intent of this research is to develop a set of recommendations and guidelines
for improving the security of Industrial Control System (ICS) and Supervisory Control
and Data Acquisition systems software. Specifically, this research focuses on the Human-
Machine Interface (HMI) software that is used on control panel workstations.</p>
<p>This document covers a brief introduction to control systems security terminology in
order to define the research area, a hypothesis for the research, and a discussion of the
contribution that this research will provide to the field. Previous work in the area by other
researchers is summarized, followed by a description of the vulnerability research, analysis,
and creation of deliverables. Technical information on the details of a number of
vulnerabilities is presented for a number of HMI vulnerabilities, for which either the author
has performed the analysis, or from public vulnerability disclosures where sufficient
information about the vulnerabilities is available.</p>
<p>Following the body of technical vulnerability information, the common features and
characteristics of known vulnerabilities in HMI software are discussed, and that information
is used to propose a taxonomy of HMI vulnerabilities. Such a taxonomy can be used to
classify HMI vulnerabilities and organize future work on identifying and mitigating such
vulnerabilities in the future.</p>
<p>Finally, the contributions of this work are presented, along with a summary of areas
that have been identified as interesting future work.</p> |
author2 |
Rayford B. Vaughn Jr. |
author_facet |
Rayford B. Vaughn Jr. McGrew, Robert Wesley |
author |
McGrew, Robert Wesley |
author_sort |
McGrew, Robert Wesley |
title |
Vulnerability analysis case studies of control systems human machine interfaces |
title_short |
Vulnerability analysis case studies of control systems human machine interfaces |
title_full |
Vulnerability analysis case studies of control systems human machine interfaces |
title_fullStr |
Vulnerability analysis case studies of control systems human machine interfaces |
title_full_unstemmed |
Vulnerability analysis case studies of control systems human machine interfaces |
title_sort |
vulnerability analysis case studies of control systems human machine interfaces |
publisher |
MSSTATE |
publishDate |
2013 |
url |
http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ |
work_keys_str_mv |
AT mcgrewrobertwesley vulnerabilityanalysiscasestudiesofcontrolsystemshumanmachineinterfaces |
_version_ |
1716731862181740544 |