Securing Automation Systems Against Malware Intrusion

Robert Fitz, Wolfgang A. Halang

Abstract


Conventional measures do not sufficiently protect computing systems anymore against intruders and malware of any kind. The main reason for this is that the system architectures are based on highly insecure and error-prone foundations. Whereas some time ago this shortcoming could still be partially coped with by swift counteraction, today this “race” must be considered lost right from the start due to the fast data networks. There are no reactive measures anymore that could compensate for the aggressors' temporal advantage. Since computers employed for automation and control purposes are more and more connected to networks and are, thus, endangered by malware, new architectures for their hardware and software as presented in this paper are necessary, which solve the security problems by their intrinsic properties. 


Keywords


Computer control; Automation; Safety-related control; Security; Malware; Intrusion prevention; Hardware-based security measures

References


“Der Schädlings-Flut Herr werden”, Bundeswehr aktuell, 48(4)5, 30 January 2012, on-line: s337251796.online.de/2012/KW4/html/ 10005.html

W.A. Halang and R. Fitz, “Speichersegmentierung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Eindringen”, German patent registration DE10031212A1, 2000

W.A. Halang and R. Fitz, “Kontextsensitive Speicherzuordnung in Datenverarbeitungsanlagen zum Schutz vor unbefugtem Ausspähen und Manipulieren von Daten”, German patent registration DE10031209A1, 2000

W.A. Halang and R. Fitz, “Gerätetechnische Schreibschutzkopplung zum Schutz digitaler Datenverarbeitungsanlagen vor Eindringlingen während der Installationsphase von Programmen”, German patent 10051941 since 20 October 2000

W.A. Halang and R. Fitz: “Offenbarendes Verfahren zur Überwachung ausführbarer oder interpretierbarer Daten in digitalen Datenverarbei- tungsanlagen mittels gerätetechnischer Einrichtungen. German patent registration DE10055118A1, 2000

R. Langner, “Stuxnet: Dissecting a Cyberwarfare Weapon”, IEEE Security & Privacy, 9(3)49–51, 2011

K. Rannenberg, A. Pfitzmann and G. Müller, “Sicherheit, insbesondere mehrseitige IT-Sicherheit”, in: Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 21–29, Bonn: Addison-Wesley 1997.




DOI: https://doi.org/10.17648/enig.v1i1.16

Refbacks

  • There are currently no refbacks.




Licença Creative Commons
This site is licensed with the Creative Commons Atribuição-NãoComercial-SemDerivações 4.0 Internacional

RENASIC Logo1 Logo2 Logo3