StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications
-
Published:2024-06-25
Issue:13
Volume:13
Page:2475
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Koffi Koffi Anderson1ORCID, Kampourakis Vyron2ORCID, Song Jia1ORCID, Kolias Constantinos1ORCID, Ivans Robert C.3ORCID
Affiliation:
1. Department of Computer Science, University of Idaho, 1776 Science Center Dr suite 304, Idaho Falls, ID 83402, USA 2. Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2802 Gjøvik, Norway 3. Idaho National Laboratory, Idaho Falls, ID 83415, USA
Abstract
Rigorous testing methods are essential for ensuring the security and reliability of industrial controller software. Fuzzing, a technique that automatically discovers software bugs, has also proven effective in finding software vulnerabilities. Unsurprisingly, fuzzing has been applied to a wide range of platforms, including programmable logic controllers (PLCs). However, current approaches, such as coverage-guided evolutionary fuzzing implemented in the popular fuzzer American Fuzzy Lop Plus Plus (AFL++), are often inadequate for finding logical errors and bugs in PLC control logic applications. They primarily target generic programming languages like C/C++, Java, and Python, and do not consider the unique characteristics and behaviors of PLCs, which are often programmed using specialized programming languages like Structured Text (ST). Furthermore, these fuzzers are ill suited to deal with complex input structures encapsulated in ST, as they are not specifically designed to generate appropriate input sequences. This renders the application of traditional fuzzing techniques less efficient on these platforms. To address this issue, this paper presents a fuzzing framework designed explicitly for PLC software to discover logic bugs in applications written in ST specified by the IEC 61131-3 standard. The proposed framework incorporates a custom-tailored PLC runtime and a fuzzer designed for the purpose. We demonstrate its effectiveness by fuzzing a collection of ST programs that were crafted for evaluation purposes. We compare the performance against a popular fuzzer, namely, AFL++. The proposed fuzzing framework demonstrated its capabilities in our experiments, successfully detecting logic bugs in the tested PLC control logic applications written in ST. On average, it was at least 83 times faster than AFL++, and in certain cases, for example, it was more than 23,000 times faster.
Reference50 articles.
1. Stouffer, K., Pease, M., Tang, C., Zimmerman, T., Pillitteri, V., Lightman, S., Hahn, A., Saravia, S., Sherule, A., and Thompson, M. (2023). Guide to Operational Technology (OT) Security, NIST. Technical Report NIST Special Publication (SP) 800-82 Rev. 3. 2. Cybersecurity for industrial control systems: A survey;Bhamare;Comput. Secur.,2020 3. Tychalas, D., Benkraouda, H., and Maniatakos, M. (2021, January 11–13). {ICSFuzz}: Manipulating {I/Os} and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications. Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada. 4. Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the US;Shehod;Cybersecur. Interdiscip. Syst. Lab. MIT,2016 5. ICS malware Triton attack and countermeasures;Myung;Int. J. Emerg. Multidiscip. Res.,2019
|
|