Vulnerability analysis case studies of control systems human machine interfaces

<p>This dissertation describes vulnerability research in the area of critical infrastructure security. The intent of this research is to develop a set of recommendations and guidelines for improving the security of Industrial Control System (ICS) and Supervisory Control and Data Acquisition sy...

Full description

Bibliographic Details
Main Author: McGrew, Robert Wesley
Other Authors: Rayford B. Vaughn Jr.
Format: Others
Language:en
Published: MSSTATE 2013
Subjects:
Online Access:http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/
id ndltd-MSSTATE-oai-library.msstate.edu-etd-03192013-130105
record_format oai_dc
spelling ndltd-MSSTATE-oai-library.msstate.edu-etd-03192013-1301052015-03-17T15:54:59Z Vulnerability analysis case studies of control systems human machine interfaces McGrew, Robert Wesley Computer Science and Engineering <p>This dissertation describes vulnerability research in the area of critical infrastructure security. The intent of this research is to develop a set of recommendations and guidelines for improving the security of Industrial Control System (ICS) and Supervisory Control and Data Acquisition systems software. Specifically, this research focuses on the Human- Machine Interface (HMI) software that is used on control panel workstations.</p> <p>This document covers a brief introduction to control systems security terminology in order to define the research area, a hypothesis for the research, and a discussion of the contribution that this research will provide to the field. Previous work in the area by other researchers is summarized, followed by a description of the vulnerability research, analysis, and creation of deliverables. Technical information on the details of a number of vulnerabilities is presented for a number of HMI vulnerabilities, for which either the author has performed the analysis, or from public vulnerability disclosures where sufficient information about the vulnerabilities is available.</p> <p>Following the body of technical vulnerability information, the common features and characteristics of known vulnerabilities in HMI software are discussed, and that information is used to propose a taxonomy of HMI vulnerabilities. Such a taxonomy can be used to classify HMI vulnerabilities and organize future work on identifying and mitigating such vulnerabilities in the future.</p> <p>Finally, the contributions of this work are presented, along with a summary of areas that have been identified as interesting future work.</p> Rayford B. Vaughn Jr. David A. Dampier Mahalingam Ramkumar Thomas H. Morris MSSTATE 2013-04-23 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report.
collection NDLTD
language en
format Others
sources NDLTD
topic Computer Science and Engineering
spellingShingle Computer Science and Engineering
McGrew, Robert Wesley
Vulnerability analysis case studies of control systems human machine interfaces
description <p>This dissertation describes vulnerability research in the area of critical infrastructure security. The intent of this research is to develop a set of recommendations and guidelines for improving the security of Industrial Control System (ICS) and Supervisory Control and Data Acquisition systems software. Specifically, this research focuses on the Human- Machine Interface (HMI) software that is used on control panel workstations.</p> <p>This document covers a brief introduction to control systems security terminology in order to define the research area, a hypothesis for the research, and a discussion of the contribution that this research will provide to the field. Previous work in the area by other researchers is summarized, followed by a description of the vulnerability research, analysis, and creation of deliverables. Technical information on the details of a number of vulnerabilities is presented for a number of HMI vulnerabilities, for which either the author has performed the analysis, or from public vulnerability disclosures where sufficient information about the vulnerabilities is available.</p> <p>Following the body of technical vulnerability information, the common features and characteristics of known vulnerabilities in HMI software are discussed, and that information is used to propose a taxonomy of HMI vulnerabilities. Such a taxonomy can be used to classify HMI vulnerabilities and organize future work on identifying and mitigating such vulnerabilities in the future.</p> <p>Finally, the contributions of this work are presented, along with a summary of areas that have been identified as interesting future work.</p>
author2 Rayford B. Vaughn Jr.
author_facet Rayford B. Vaughn Jr.
McGrew, Robert Wesley
author McGrew, Robert Wesley
author_sort McGrew, Robert Wesley
title Vulnerability analysis case studies of control systems human machine interfaces
title_short Vulnerability analysis case studies of control systems human machine interfaces
title_full Vulnerability analysis case studies of control systems human machine interfaces
title_fullStr Vulnerability analysis case studies of control systems human machine interfaces
title_full_unstemmed Vulnerability analysis case studies of control systems human machine interfaces
title_sort vulnerability analysis case studies of control systems human machine interfaces
publisher MSSTATE
publishDate 2013
url http://sun.library.msstate.edu/ETD-db/theses/available/etd-03192013-130105/
work_keys_str_mv AT mcgrewrobertwesley vulnerabilityanalysiscasestudiesofcontrolsystemshumanmachineinterfaces
_version_ 1716731862181740544