Industrial Security

Industry 4.0 is expected to transform the industrial landscape and intelligent production processes towards the creation of customized products, increased flexibility and efficiency of manufacturing, and advanced automation. It incorporates digitalization and the Internet of Things. The new features require establishing information networks that connect machinery, facilities, and devices. Therefore, Industry 4.0 also leads to an increased risk of cyber-attacks from external threats.

Industrial espionage and sabotage are becoming a significant threat, and, due to increased network connectivity, the risks will continue to grow. Attacks on industrial plants can lead to a loss of reputation and direct financial damage, for those who provide the infrastructure and for those who operate plant and machinery. In extreme cases, in sensitive areas, lack of security and protection from attackers can lead to exposure of safety of those plants.

In the light of these threats, there is a need for security solutions that take future developments into account. This requires integrating necessary security measures into facilities and machinery at an early stage of the product design and development (Security by Design). Nevertheless, there is still the need for solutions that enhance security at existing sites that are in operation now. This includes the provision of security for specific components, communication channels, embedded systems, and control mechanisms.

Expertise

  • Security analysis of core components such as PLCs, addressing their security levels
  • Secure remote access, maintenance, and updates
  • Providing security for manufacturing equipment and plant networks
  • Secure machine-to-machine communication
  • Providing security for field bus communication
  • Protection for service processes (e.g., managing function activations and maintenance modes being accessible only by authorized technicians)
  • Support in the development of manipulation-resistant components
  • Securing data by bridging the gap between virtual and real-world production environments

Publications

  • G. Hansch, P. Schneider and S. Plaga. “Packet-wise Compression and Forwarding of Industrial Network Captures”. In: Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2017). Bucharest, Romania: IEEE, 2017, pp. 66–70. ISBN: 9781538606964.
  • S. Plaga, M. Niethammer, N. Wiedermann and A. Borisov. “Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case”. Kooperation im Rahmen von IUNO AP4, Fraunhofer AISEC mit BOSCH Corporate Sector Research and Advance Engineering submitted to "The 1st International Conference on Data Intelligence and Security". to be published April 2018.
  • A. Giehl and N. Wiedermann. “Security verification of third party design files in manufacturing”. In: Proceedings of the 10th International Conference on Computer and Automation Engineering. ICCAE ’18. Brisbane, Australia, to be published Feb. 2018.C. Eckert. “Cyber-Sicherheit in Industrie 4.0”. In: Handbuch Industrie 4.0: Geschäftsmodelle, Prozesse, Technik. Ed. by G. Reinhart. München: Carl Hanser Verlag, 2017, pp. 111–135.
  • K. Böttinger. “Guiding a Colony of Black-box Fuzzers with Chemotaxis”. In: 38th IEEE Symposium on Security and Privacy (S&P 2017) Workshops, 2017.
  • G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, M. Carolan, D. Conroy, K. Böttinger, M. Gall, G. Brost, C. Ponchel, M. Haustein, H. Kaufmann, K. Theuerkauf and P. Olli. “A Collaborative Cyber Incident Management System for European Interconnected Critical Infrastructures”. In: Journal of Information Security and Applications Special Issue on ICS & SCADA Cyber Security (2016).
  • K. Böttinger. “Fuzzing Binaries with Lévy Flight Swarms”. In: EURASIP Journal on Information Security (2016). DOI: doi:10.1186/s13635-016-0052-1.
  • J. Wolf, F. Wieczorek, F. Schiller, G. Hansch, N. Wiedermann and M. Hutle. “Adaptive Modelling for Security Analysis of Networked Control Systems”. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR 2016, 23-25 August 2016, Queen’s Belfast University, UK. 2016.
  • K. Böttinger and C. Eckert. “DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries”. In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016).
  • J. Wolf, F. Wieczorek, F. Schiller, G. Hansch, N. Wiedermann and M. Hutle. “Adaptive Modelling for Security Analysis of Networked Control Systems”. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR 2016, 23-25 August 2016, Queen’s Belfast University, UK. 2016.
  • K. Böttinger, G. Hansch and B. Filipovic. “Detecting and Correlating Supranational Threats for Critical Infrastructures”. In: 15th European Conference on Cyber Warfare and Security (ECCWS 2016).
  • K. Böttinger, M. Hutle, B. Filipovic and S. Rohr. "Leitfaden Industrie 4.0 Security Handlungsempfehlungen für den Mittelstand". VDMA Verlag, 2016.
  • K. Böttinger. “Hunting Bugs with Lévy Flight Foraging”. In: 37th IEEE Symposium on Security and Privacy (S&P 2016) Workshops. May 2016.
  • J. Obermaier and M. Hutle. “Analyzing the Security and Privacy of Cloudbased Video Surveillance Systems”. In: Proceedings of the 2nd ACM Workshop on IoT Privacy, Trust, and Security. IoTPTS ’16. ACM, 2016.
  • K. Böttinger, D. Schuster and C. Eckert. "Detecting Fingerprinted Data in TLS Traffic". In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. AsiaCCS 2015.
  • M. Hutle and F. Seidel. “Vulnerability analysis of digital instrumentation and control systems important to safety – a methodical approach”. In: IAEA International Conference on Computer Security in a Nuclear World, 2015.
  • C. Eckert and N. Fallenbeck. “Industrie 4.0 meets ITSicherheit: eine Herausforderung!” In: InformatikSpektrum. Springer, March 2015.