Abstract
© 2019 Association for Computing Machinery.In 2017, malware Triton was discovered in a petrol plant in Saudi Arabia, and it shut down the safety instrumented systems in the affected industrial control system without being noticed by the operators. If the malware was not discovered by a security company on time, it could leave the system running without any safety measures, and eventually lead to an explosion. To detect such attacks, one can track the running status of the devices in the field to know that they are still “alive”. However, in practice, there yet does not exist an efficient and cryptographically secure mechanism/ protocol that can prove the aliveness of a device to control centers over an open network. This paper aims to tackle this practical problem by introducing a new cryptographic notion called Proof of Aliveness (PoA). We propose to use a one-way function (OWF) chain structure to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically, and it can be verified by a verifier with the possession of the tail (last node) of the OWF chain. However, the practicality of this construction is limited by the finite number of nodes on an OWF chain. We enhance our first PoA construction by linking multiple OWF chains together using a pseudo-random generator chain. By integrating one-time signature schemes into the structure, we can achieve auto-replenishment of aliveness-proofs, which implies that this PoA can be used forever without an interruption for reinitialization. To make our proposals more practical, we analyzed the security of the above PoA proposals in the standard model. Besides that, we also specifically defined a security model for the concept of PoA. Our PoA constructions are implemented and evaluated on Raspberry Pis for a demonstration of its performance.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019 |
| Publisher | Association for Computing Machinery |
| Pages | 1-16 |
| ISBN (Electronic) | 9781450376280 |
| DOIs | |
| Publication status | Published - 9 Dec 2019 |
| Externally published | Yes |
| Event | 35th Annual Computer Security Applications Conference, ACSAC 2019 - San Juan, United States Duration: 9 Dec 2019 → 13 Dec 2019 |
Conference
| Conference | 35th Annual Computer Security Applications Conference, ACSAC 2019 |
|---|---|
| Country/Territory | United States |
| City | San Juan |
| Period | 9/12/19 → 13/12/19 |
Funding
We would like to thank our shepherd, Yupeng Zhang, and the anonymous reviewers for their helpful comments. This work was supported by the National Research Foundation (NRF), Prime Ministers Office, Singapore, under its National Cybersecurity R&D Programme (Award No. NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate. Marten van Dijk was partially supported by AFOSR MURI under award number FA9550-14-1-0351. Chenglu Jin’s work was done during his internship in SUTD supported by the SUTD start-up research grant SRG-ISTD-2017-124.
| Funders | Funder number |
|---|---|
| Prime Ministers Office, Singapore | NRF2014NCR-NCR001-31 |
| Air Force Office of Scientific Research | FA9550-14-1-0351 |
| National Research Foundation | |
| Singapore University of Technology and Design | SRG-ISTD-2017-124 |