Research on memory access vulnerability analysis technique in SCADA protocol implementation

  • Authors:
  • Fang Lan;Wang Chunlei;He Ronghui

  • Affiliations:
  • Department of Network Research, Beijing Institute of System Engineering, Beijing, China;Department of Network Research, Beijing Institute of System Engineering, Beijing, China;Department of Network Research, Beijing Institute of System Engineering, Beijing, China

  • Venue:
  • ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA protocol implementation. Firstly, the memory taintedness model of SCADA protocol implementation is formally defined. Based on this model, the detection algorithm of memory access vulnerability is proposed. Finally, the model and algorithm are validated through the experiment of vulnerability analysis.