Pin control attack
Pin control attack is a class of attack against a system on a chip (SoC) in an embedded system where an attacker targets the I/O configuration of the embedded systems and disables software or operating system I/O functions without detection. The attack is possible due to a lack of hardware protection for pin configuration and pin multiplexing configurations.
The most significant target for a pin control attack is a programmable logic controller (PLC). The application of pin control attack on PLCs is significant because I/O is the main mechanism through which PLCs interact with and control the outside world. PLC I/O like other embedded devices are controlled by a pin based approach. Pin control attack is an attack in which the attacker can tamper with the integrity and availability of PLC I/O by exploiting certain pin control operations and the lack of hardware interrupts associated with them.
The first example of such an attack was first unveiled at Black Hat Europe 2016.[1] The pin control attack uses I/O peripheral configuration settings of the PLC SoC to physically terminate the I/O module communication interface from the PLC. By targeting the PLC I/O configuration instead of the PLC runtime or changing the logic program the attackers can avoid the typical detection mechanisms that exist in embedded systems.[2]
Background
Classic attacks against PLCs rely on modifying the device's firmware, its configuration parameters, or the execution flow of running processes. These typical attacks trigger interrupts in the PLC's normal mode of operation, which the security software such as IDS picks up and alerts the human operator. A pin control attack targets the PLC's dynamic memory, where the device stores its I/O configuration.[3][4]
Attack vectors
The researchers suggested at least two variants of the attack: Pin Configuration Attack and Pin Multiplexing Attack.[5] While these two attack vectors act differently, their concept is similar and both physically terminate the I/O from software access without a hardware interrupt, thus preventing their detection.[6]
Pin configuration attack
A PLC can receive and transmit various types of electrical and electronic signals. The input, which typically comes from sensors, and the output, which can be used to control motors, valves or relays, are linked to input and output pins on an integrated circuit known as a system on chip (SoC). The SoC’s pin controller can configure the modes of a pin (i.e. they are set to serve as input or output). The experts discovered that an attacker who has compromised the PLC can tamper with the input and output without being detected and without alerting the operators monitoring the process through a human-machine interface (HMI).[7]
Pin multiplexing attack
Embedded SoCs usually employ hundreds of pins connected to the electrical circuit. Some of these pins have a single defined purpose. For example, some only provide electricity or a clock signal. Since different equipment vendors with diverse I/O requirements will use these SoCs, the SoC manufacturer produces its SoCs to use a certain physical pin for multiple mutually exclusive functionalities, depending on the application.[8] The concept of redefining the functionality of the pin is called Pin Multiplexing and is one of the necessary specifications of the SoC design.[9] Regarding the interaction of the Pin Multiplexing with OS, it is recommended by SoC vendors to only multiplex the pins during the startup since there is no interrupt for multiplexing. However, the user still can multiplex a pin at runtime and there is no limitation on that.
The current design of Pin Multiplexing in hardware level raises security questions. For example, assume that an application uses a particular peripheral controller connected to a pin with a particular multiplexing setup. At one point another application (second application) changes the multiplexing setup of the pin used by the first application. Once the pin is multiplexed, the physical connection to the first peripheral controller gets disconnected. However, since there is no interrupt at the hardware level, the OS will assume that the first peripheral controller is still available. Thus, the OS will continue to carry out the write and read operations requested by the application without any error.[6]
The concept of changing the functionality of a pin connected to the I/O at the runtime is called Pin Multiplexing Attack.[10]
Stealthiness
Both Pin Configuration and Pin Multiplexing don’t trigger any alert or hardware interrupt.[7] Therefore, during an active attack, the PLC runtime will interact with a virtual I/O memory while the attacker physically terminated the connection of the I/O with virtual memory. The state where I/O values in the software memory do not reflect the physical I/O memory is known as I/O memory illusion.[11]
References
- "Hacking industrial processes with and undetectable PLC Rootkit". Security Affairs. 2016-09-18. Retrieved 2016-11-08.
- "Researchers build undetectable rootkit for programmable logic controllers". PCWorld. Retrieved 2016-11-08.
- "Researchers Create Undetectable Rootkit That Targets Industrial Equipment". BleepingComputer. Retrieved 2016-11-08.
- "PLCs Possessed: Researchers Create 'Undetectable' Rootkit". Dark Reading. Retrieved 2016-11-08.
- "How to compromise PLC systems via stealthy Pin control attacks". Information Security Newspaper. 2016-11-05. Retrieved 2016-11-08.
- "Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack" (PDF). Black Hat Europe Briefings 2016.
- "How to compromise PLC systems via stealthy Pin control attacks". Security Affairs. 2016-11-05. Retrieved 2016-11-08.
- "Pin control subsystem in linux Kernel". Kernel.org.
- "A method to make soc verification independent of pin multiplexing change". International Conference on Computer Communication and Informatics (ICCCI). 2013.
- "PLCs Vulnerable to Stealthy Pin Control Attacks | SecurityWeek.Com". www.securityweek.com. Retrieved 2016-11-08.
- "Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack (Presentation)" (PDF). Black Hat Europe Briefings.