Iiot Security Journal
Iiot Security Journal
Iiot Security Journal
1 INTRODUCTION
The constant need for the development of intelligent industry and smart factories forced the sys-
tematic exploitation of IoT devices into industrial applications. Many tasks, such as production
monitoring and control, or communication and data analysis for logistics, are every day more
demanded to millions of devices spread around the world. Traditional logic controllers are re-
placed by more advanced Cyber-Physical Systems (CPSs), usually connected to the Internet. This
transformation is the key to enable what is now known as Industry 4.0 or smart manufacturing [11].
In the meantime, security issues have not yet received sufficient attention from manufacturers
and users. Therefore, this vast amount of IIoT devices are becoming attractive targets for attackers to
Authors’ addresses: Xingbin Jiang, [email protected], Singapore University of Technology and Design, Information
Systems Technology and Design (ISTD), Singapore; Michele Lora, [email protected], Singapore University of
Technology and Design, Information Systems Technology and Design (ISTD), Singapore; Sudipta Chattopadhyay, sudipta_
[email protected], Singapore University of Technology and Design, Information Systems Technology and Design
(ISTD), Singapore.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the
full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM.
1533-5399/2020/1-ART $15.00
https://doi.org/0000001.0000001
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
2 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
do malicious operations or obtain sensitive information. A query using Shodan or similar searching
engines shows that there exists a large number of IIoT devices that are exposed on the Internet
without being adequately secured [6].
While consequences of cyber attacks may be generally dramatic, they may be catastrophic when
affecting industrial applications. Effects may range from stolen classified information to causing
physical damages to the production systems. For instance, an attacker gaining control of the system
actuators may also cause physical harm to workers [7]. Any of these scenarios may be catastrophic.
Stuxnet, for instance, has been advocated to be capable of causing a “new Chernobyl” [24] by
compromising the industrial control systems of nuclear plants. Indeed, this would be an extreme
scenario. Still, even the less critical attack may cause substantial economic losses due to production
downtime [37], or leak of information related to intellectual properties. This is further worsened by
recent manufacturing trends, where a leak of a connected device configuration may cause the leak
of information about the product being produced by a reconfigurable manufacturing system [35].
Control Center
IP:192.168.1.11
Controller-1 Controller-2
(i.MX6) (i.MX6)
IP:192.168.1.9 IP:192.168.1.10
Sub-Controller-1 Sub-Controller-2
(Arduino) (Arduino)
Actuator-1 Actuator-2
(Servo Motor) (Servo Motor)
Fig. 1. Overview of the system target of our attacks: it is composed of two i.MX6 micro-controllers connected
to the Local Area Network (LAN), each of them is controlling a servo motor actuator through an Arduino
device.
Much work has been done to improve the security of the IoT devices [44]. However, industrial
scenarios introduce further constraints that are not considered in classic IoT applications. IIoT
applications are usually safety-critical and time-constrained (e.g., controlling robotic arms operating
alongside human). Hence, attack detection techniques must be performed in-place as delegating
remote servers or cloud systems will introduce variability in the system timing, thus affecting
real-time constraints [10]. At the same time, such solutions might expose new attack surfaces.
Thus, solving security and privacy issues on IIoT systems requires to consider a higher number
of dimensions with respect to targeting the same problem for classic IoT applications. Some
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 3
articles [3, 37, 47] have discussed the vulnerabilities that can potentially afflict an IIoT device, as
well as potential protection methods [47]. However, none of them presented systematic research of
the attack surfaces, attack vectors, and prevention methods for a typical IIoT device. In this paper,
we systematically analyze the feasibility of attacking an IIoT device by exploring concrete attack
surfaces and attack vectors.
In particular, we come up with a variation of Mirai attack. While classic Mirai attack is usually
used to perform Distributed Denial of Service (DDoS) attacks, the proposed variation aims at gaining
control of the actuators to create dangerous situations, and stealing reserved information from the
connected devices. Then, we extend our attack by making it stealthy to make it less identifiable by
defense mechanisms. The experimental analysis is based on a networked embedded system, whose
structure is depicted in Figure 1: it is composed of two micro-controllers connected to the network,
and controlling a physical actuator each. The devices we decided to use in this work are two i.MX
6SoloX Smart Application Blueprint for Rapid Engineering (SABRE) boards from NXP, being it
representative of a wide class of IIoT devices. The i.MX boards are then connected to a couple
of Arduino devices for further controlling the servo motor actuators. During our vulnerability
analysis, we will gain control of the actuators, and make them perform some hazardous actions,
such as moving to unsafe positions.
• We analyze the vulnerabilities in a typical IIoT device to characterize its attack surfaces
and vectors. We use the device as the central core to build a scenario involving distributed
actuation, that is typical of industrial control systems.
• We analyze the security of the IIoT devices connected to the Internet today. We get inspired
by previous analysis [2, 6, 43] to update the findings, and relate them to the IIoT device used
for the presented experimental analysis.
• We set up a set of attack scenarios to show how the attack on a common IIoT device may
impact on the safety of an industrial actuator system.
• We propose a novel version of Mirai attack, aiming at impacting on the physical actuator
system. Furthermore, we present a method to make Mirai attack stealthy, and consequently
difficult to be identified by general protection mechanisms: thus providing the attacker more
time to inflict more physical damages to the actuation system.
The following of the paper is organized as follows: Section 2 introduces the necessary background,
the system used as case study in the paper, and the state of the art about the different techniques
used in this work. Section 3 defines the system target of our analysis, identifying its attack surfaces,
and introduces the attack scenarios. Furthermore, we present the updated analysis of security
threats for IIoT devices we carried on, and we relate the finding of such analysis to the attack
scenarios explored in our experimental analysis for the target system. Sections 4 to 6 detail the
different attack scenarios and present their results. Finally, in Section 7 we discuss some possible
countermeasures before drawing some conclusions in Section 8.
2 BACKGROUND
This section introduces the main concepts related to the introduction of IoT within industrial
environments. Then, it details the architecture of the system used as a case-study in this work.
Finally, it presents the related work available in the literature.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
4 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
Controller Plant
Controller Area
Network
Industrial
Control Systems
Local Area
The Internet Network
Industrial
Control Control Systems
Center
Controller Area
Network
Controller Plant
Networked Control System
Fig. 2. Placement of an IIoT system within a manufacturing company system, highlighting the differences
between Industrial Control System, Networked Control System and IIoT system.
are distributed and controlled through a communication network. Then, the growth of the IoT
led to introducing such technology into industrial production systems, consequently introducing
the concept of IIoT. At the current state of the practice, these concepts are co-existing within
the same production systems. Figure 2 aims at clarifying the borders between industrial control
systems, networked control systems, and IIoT systems. It shows a generic structure of a modern
manufacturing company: its production plants may be distributed geographically and connected
through the Internet. Each production plant is connected to its controller(s), usually through an
ad-hoc network, often creating a Controller Area Network (CAN), composing an industrial control
system. Multiple industrial control systems connected through a LAN compose a networked control
system, traditionally isolated from the external world. However, when such systems are connected
to the external world through the Internet, they become IIoT systems.
In order to perform our experimental analysis, we built a low-cost system presenting the typical
characteristics of an IIoT system. It is based on two i.MX6 micro-controllers produced by NXP. Each
micro-controller integrates two CAN buses, it provides two Gigabit ethernet interfaces, and many
other features making it ideal to be deployed for industrial applications1 . An Ethernet network
connects the two micro-controllers to a control center. The control center is connected to the
Internet, and it acts as gateway for the networked control system composed by the two i.MX6
micro-controllers.
On the controlled plant side, the two micro-controllers are connected to an Arduino device each.
The Arduino devices act as an interface to a couple of servo motor actuators. These actuators
must operate within a specific range of positions. Even though the physical plant is not built using
hardware typically used in concrete industrial scenarios, it is meant to present the same vulnera-
bilities of a real-life industrial system. For instance, Arduino devices may be used to prototype a
cyber-physical system, such as a production plant. However, it is not realistic to deploy an Arduino
device in the final system. For this reason, our analysis does not consider the attack vectors of
the Arduino devices. On the contrary, the i.MX6 micro-controller is meant to be deployed when
1 NXP i.MX6 fact sheet: https://www.nxp.com/docs/en/fact-sheet/IMX6SRSFS.pdf
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 5
implementing internet-enabled industrial control system, and IoT systems in general. Furthermore,
its attack surface shares several characteristics with the devices discovered in the Shodan-based
analysis about the Worldwide state-of-the-practice presented in Section 3.2. As such, our case-study
is a low-cost prototype representative of many IIoT systems.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
6 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
still lack of comprehensive analysis of the attack surfaces, attack vectors, and prevention methods
for a typical IIoT device.
Attacks to industrial control systems are a major threat of modern cyber warfare [24]. After
Stuxnet [29] was revealed, new attacks against industrial control systems continued to occur.
Havex [28] is a remote access Trojan discovered in 2013. It is part of a wide range of espionage
activities for industrial control systems that are widely used in various industries. Havex has im-
pacted up to 2,000 infrastructure sites, specifically for energy grid operators, large power generation
companies, oil pipeline operators and industrial equipment providers [28]. BlackEnergy [26] first
appeared as a DDoS tool in 2007. Its improved version - BlackEnergy3 (BE3) participated in a
cyber attack in Ukraine in 2015, causing power outages [23]. Although BE3 has no direct effect on
powering down, BE3 was used in the early stages of the attack to gather information about the
industrial control systems environment and was likely to be used to compromise the network oper-
ator’s user credentials. CRASHOVERRIDE [27], also known as "Industroyer", is the first malware
specifically designed for the electric grid. It was used in a cyberattack on December 17, 2016, which
powered off the Ukrainian transit station on the outskirts of Kiev, cutting off about one-fifth of the
power. TRISIS [30], also known as TRITON or HatMan, is a malware variant of Schneider Electric’s
Triconex Safety Instrumented Systems (SIS) controller. It was discovered in December 2017 by
FireEye’s network security company Mandiant. FireEye determined that TRITON was specifically
designed to interact with these SIS controllers and believed that the participants or organizations
behind the attack may be trying to develop the ability to physically damage and stop operations on
the organization’s equipments.
Other than exploring already well-known attacks in the attacking surface of a concrete case
study, in this work we are also going to refine a particular kind of attack, i.e. Mirai, to tailor it to
target industrial control systems more effectively. Mirai is malicious software that turns networked
devices running Linux into bots, and creates botnets of these compromised IoT devices, aiming at
launching large-scale DDoS attacks. It has been used to infect a large number of online consumer
devices such as IP cameras and home routers, and launch serious attacks on servers of the DNS
provider Dyn, resulting in inaccessibility of several high profile websites such as GitHub, Twitter
and Reddit [14]. The proliferation of Mirai fully illustrated the serious insecurity problem of IoT
devices. A lot of research work analyzing the working mechanism of Mirai and the harm of such
kind of botnets has been studied since then [5, 22, 40]. However, to the best of our knowledge,
we have not found related work considering that Mirai and its variants may be applied to IIoT
systems. Moreover, how to make Mirai attack a stealthy attack and discuss defenses is also a unique
contribution from our work.
3 OVERVIEW OF VULNERABILITIES
The focus of the paper is an experimental analysis that aims at attacking the system introduced in
Section 2.1, with the target of gaining control of its actuators and stealing reserved information
from the device. Figure 3 shows the two actuators: Figure 3a shows the actuator whose arm is
operating in the safe area of operation. Figure 3b depicts the actuators whose arm is in a critical
configuration. The experimental analysis aims at violating the system and making its actuators
working in the latter configuration (i.e. Figure 3b).
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 7
(a) (b)
Fig. 3. (a) shows a servo actuator in our system during normal operation; (b) shows the actuator reaching an
hazardous condition once the system has been compromised.
since 2014 provides a summary of attack surfaces associated with the top IoT vulnerabilities. In
this work we address all the vulnerabilities identified in the latest edition, i.e., the 2018 edition.
The IIoT devices we focus on are mainly used as smart controllers for industrial applications. In
this case, the primary objective of the attackers is to misuse the IIoT devices to harm the system. In
fact, the possibility of physically damaging the system through a cyber attack is a peculiarity of IoT
that is even more critical for IIoT systems. We also analyze privacy concerns, as one of the attack
scenarios we are going to carry on will also steal information from the device. However, we do not
consider some attack surfaces that are more important in the consumer IoT field, such as Insecure
Mobile Interface. To this end, we focused on Insecure Web Interface, Insufficient Authentication, Lack
of Transport Encryption, Insecure Network Services and Insecure Software/Firmware. Then, for each
attack surface, we identify its attack vectors based on our goal of gaining control of the actuators.
Then, we define different attack scenarios that use the identified attack vectors. Table 1 summarizes
the results of our analysis in the first two columns. The third column reports, for each attack surface,
the concrete attack scenarios that will be applied to the reference device.
The final target of our experimental analysis is to gain control of the system, interfering with the
servo motors moving their arms out of normal operation modes, and stealing restricted information.
Figure 4 shows the different path we will follow to compromise the system. We exploit the five attack
surfaces identified in Table 1, throughout three attack scenarios, namely, Web Management System,
Remote Software Update, and Mirai Attack. In each scenario, we alternatively exploit different attack
vectors to gain control of the system, to provide a concrete example of threats affecting industrial
devices. During our experiments, we will try to gain control of the Web Management System by
exploiting weak authentication, SQL injection, Cross-site Scripting (XSS), and Cross-site Request
Forgery (CSRF). It is worth noticing that all of these techniques will, however, require either a
poor system configuration or to access the control settings of the system (e.g., inside job). The
Remote Software Update scenario will require to upload a malicious package and to capture system
information for further compromising the system. Finally, we will present a variation of Mirai
attack targeting actuators instead of performing DDoS on the system. Since a defender can fairly
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
8 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
Table 1. Summary of the attack surfaces, vectors and scenarios identified in the case study presented in this
work with respect to the 2018 OWASP IoT top 10 vulnerabilities.
Attack Surfaces
Attack Vectors Attack Scenario
(OWASP IoT Top10 2018)
1. Weak, Guessable, or Hardcoded Passwords Use weak password to login Web Management System
Compromise the device through
2. Insecure Network Services vulnerable network services Mirai attack
(e.g., Telnet, HTTP, SSH, etc.)
SQL Injection
3. Insecure Ecosystem Interfaces Cross-site scripting (XSS) Web Management System
Cross-site request forgery (CSRF)
Upload malicious packages in absence
4. Lack of Secure Update Mechanism Remote Software Update
of authentication
Compromise the device through
vulnerable network services Mirai attack
(e.g., Telnet, HTTP, SSH, etc.)
5. Use of Insecure or Outdated Components
SQL Injection
Cross-site scripting (XSS) Web Management System
Cross-site request forgery (CSRF)
Capture data via network due to lack
Remote Software Update
6. Insufficient Privacy Protection of encryption
Leak of reserved information Mirai attack
Capture data via network due to lack
7. Insecure Data Transfer and Storage
of encryption
Remote Software Update
Upload malicious packages in absence
8. Lack of Device Management
of authentication
Use of well-known default
9. Insecure Default Settings Web Management System
username and password
10. Lack of Physical Hardening Lead actuators to unsafe states Mirai attack
Weak password
Web SQL injection
Management
System XSS
CSRF
TARGET: Remote Change settings
Upload malicious package or control
Gain control Software
of actuators Update Capture data via network actuators
Non-stealthy Mirai
Mirai Attack
Stealthy Mirai
Fig. 4. Tree-based representation of our attack strategy: the root represents our final target (i.e., to attack
the system actuators), while each node represents a possible action. Each path from the root to the leaves
identify a specific attack.
easily identify this kind of attack, we will extend the attack to make it stealthy by utilizing both
Linux Kernel Module (LKM) rootkits and Stunnel.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 9
Fig. 5. Correlation between the Scenarios explored in this work and the Most common types of vulnerabilities
identified in [4]. The types of vulnerability are sorted according to the percentage (reported in brackets) of
vulnerabilities identified and belonging to the type.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
10 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
Table 2. Results obtained through the Shodan search engine while searching for industrial control systems,
and IIoT devices, connected to the Internet and currently exposing insecure services. The results refer to a set
of queries perfomed on March 15, 2019.
study identified seven vulnerabilities in a well-known IIoT middleware. The identified vulnerabilities
allow a remote attacker to execute any command on an IIoT device managed by the affected
middleware, as well as gaining root access to the system.
It is easily noticeable that the third scenario considered in our experimental analysis (i.e., Mirai
attack) is not related to any of the identified vulnerabilities. This is due to the fact that Mirai attack
exploits insecure network services. Of course, Mirai attack may be performed by an inside malicious
user or after acquiring root access to the system. Thus, it may be performed as a variation of the first
two scenarios and by exploiting the same vulnerabilities. However, Mirai attack may be performed
also by exploiting vulnerabilities of insecure network services that may be exposed to the Internet
by an IIoT device. For this reason, we searched for how many IIoT devices are nowadays exposing
insecure network services to the Internet. A similar analysis has been carried on in [2], however it
was restricted only to a very limited geographical area, i.e., Jordan. We performed a similar search,
but extended to the entire World. We relied on the Shodan search engine to discover devices and
services on the Internet [43]. In order to restrict our search to only IIoT devices, we filtered devices
by producer keeping only those producing IoT devices specialized for industrial applications. Then,
we refined our search to identify how many of these devices were exposing three of the most
notable insecure network services, i.e. HTTP, Telnet and SSH. Table 2 reports the results of our
scanning. We were able to found more than 600000 IIoT devices connected to the Internet. Of these,
the 2.37 % were using insecure services. As such, they are potential victims in the third scenario
(cf. Figure 4) presented in our experimental analysis.
The presented data highlights how the case study shares its attack surface with many devices
currently deployed in industrial plants. The following of the paper shows the application of the
three scenarios reported in Figure 4, each of them exploiting the attack vectors just discussed.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 11
revision information of the web management system. Tables t_pattern, t_firewall and t_servo
stores the information about the configuration of the usage patterns, firewall and actuator.
We identified four types of attack vectors available for accessing the web interface, then to gain
control of the actuators, as introduced in Figure 4.
Fig. 6. Web interface of the management system. It can be used to set or control the actuator.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
12 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
injection, the attacker inputs an SQL statement, rather than justifiable data. Then, the website will
unknowingly run the given statement on the database. If there is no method to validate the legality
of the user input, the attacker can enter a malicious input instead of a well-formed username and
password. So, for instance, it might input:
username : admin | password : 1 'OR `1 '= `1
Then, the SQL statement will become:
SELECT id , username , password
FROM t_user
WHERE username =` admin '
AND password = `1 ' OR `1 '= `1 '
The SQL statement above is valid and returns all rows from the table t_user, since OR‘1’=‘1’ is
always TRUE. The attacker can successfully login to the web interface without knowing the correct
user credentials. Then, it can gain control of the actuators as described in the above attack vector.
Listing 1. Implementation of an XSS attack. Line 2 retrieve the section identifier from the browser. Line 4
displays it to the attacker whenever the link described in Line 5 is clicked.
1 < script >
2 var Str = document . cookie ;
3 var a = document . createElement ( 'a ');
4 a . href = " javascript : alert ( Str ) " ;
5 a . innerHTML = " < img src = '../ page / xss . jpg '>" ;
6 document . body . appendChild ( a );
7 </ script >
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 13
Fig. 7. Injecting malicious Javascript code, the attacker can retrieve another user’s Session identifier, using it
to access the system.
hazard control of the actuator, with a specific URL. Since the browser already obtained the Session
Identifier from the web management system, the above URL will be executed successfully without
requesting to login.
Fig. 8. Leaving a web management system logged in session in a browser exposes the system to CSRF attacks.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
14 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
to implement the remote software update system. SWUpdate is a Linux update agent aiming at
providing an efficient and safe way to update embedded systems. It supports local and remote
updates and multiple update strategies. The setup used to experiment this scenario is shown in
Figure 9. The i.MX6 device is running Yocto Linux, a Mangoose web-server for remote access to the
update system, the SWUpdate tool, and an OpenSSL module for authentication and encryption. It
is connected to a LAN accessible by both the attacker and non-malicious users. The updating target
is the imxmg.cgi program used in the Web Management System for manipulating the settings and
operations.
Fig. 9. Overall setup for the remote software update experiments. (1) The attacker can upload a malicious
package if the update mechanism of the system is without authentication. (2) The attacker can capture
sensitive data via the network if the transport is not encrypted.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 15
Fig. 10. The Attacker can gather sensitive information from the unencrypted package simply sniffing the, e.g.
the database SQLite3 used in the device.
can further exploit this information to attack other parts of the device, such as performing SQL
injection attacks on the web management system, thus gain control of actuators as discussed in
Section 4.
6.1 Gaining control of actuators and stealing information through Mirai attack
We modified the source code of Mirai, making it able to gather sensitive information from the
device and to gain control of the system actuators other than performing DDoS attack against
the system remote control center. The actuators are attacked to disturb the production tasks and
causing business losses. Then, attacking the remote control center can increase the difficulty of
troubleshooting the attack, thus making it more effective. Still, DDoS does not avoid the attack to
be identified. Thus, we turn Mirai into a stealthy attack. The stealthy Mirai attack is less likely to
be detected and mitigated.
Figure 11 reports the main steps of the Mirai attack targeting the two actuators and the remote
control interface of the system. Red dashed arrows and numbers indicate the operations to perform
non-stealthy Mirai attack; green solid lines and numbers identify the operations necessary to make
3 Source code of the Mirai attack for IIoT available at: https://gitlab.com/asset-sutd/public/mirai4iiot
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
16 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
Control Center
IP:192.168.1.11
6 6
Controller-1 2 Controller-2
(i.MX6) (i.MX6)
IP:192.168.1.9 IP:192.168.1.10
z
5 1 3 5
Sub- 4 Sub-
0
Controller-1 0 Controller-2
(Arduino) (Arduino)
Actuator-1 Actuator-1
(Servo Motor) Mirai Server (Servo Motor)
IP:192.168.1.14
Fig. 11. Steps of the Mirai attack performed to gain control of the actuators. The red dashed arrows and
numbers depict non-stealthy Mirai attack. The green arrows show the actions to be performed before a Mirai
attack to hide it.
Mirai attack stealthy. The non-stealthy Mirai attack in our case study proceeds as follows, Figure 12
shows the execution of the attack step-by-step:
(1) Load Mirai to controller-1: the Loader Server tries to login to the IIoT device (Controller-1,
192.168.1.9) by using the default username and password (e.g., root|123456), or by obtaining
the username and password by brute-forcing the IIoT device. However, even if an IIoT devices
do not use the weak authentication credentials, the attacker may also invade them by other
means, such as insider threats or phishing attacks. After successfully logging in, the Loader
Server asks the device to download the Mirai main program from the attacker’s File Server
by using TFTP. The Loader Server then prompts the device to run the Mirai main program,
thus transforming the device into a bot.
(2) Scan and report controller-2: the bot starts using Telnet to connect to the Command and
Control (CNC) Server. Meanwhile, the bot scans other devices in the LAN, reporting the
obtained result (Controller-2, 192.168.1.10 with root|123456) to the Scan Listener.
(3) Load Mirai to controller-2: the Loader Server retrieves the IP address, username, and password
of Controller-2 from the Scan Listener. Then, it injects the Mirai botnet to Controller-2 using
the same process used to infect Controller-1.
(4) Bots report device information: both controllers in the system turned into bots. Then, they
can gather sensitive information about the devices to report to the Mirai server. In our case,
the Mirai botnet reads the configuration file of the device and report the detailed device
configuration and its usage information, as shown in Figure 12a- 4 .
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 17
(5) Bots attack actuators: the bots can send commands to the actuators, forcing them to perform
unsafe actions. In our case, the Mirai botnet moves the robot arm of the servo motor to the
dangerous region, as shown in Figure 12b.
(6) Bots attack victim server: the attacker can promote the bots to mount DDoS attacks targeting
the remote control interface (192.168.1.11), as shown in Figure 12c. A considerable number
of DDoS packages will make the remote control interface not working correctly, increasing
the difficulty of troubleshooting. This, in turn provides more time to the Mirai attack for
compromising the physical actuators.
Although Mirai attack can spread widely, it can be easily detected by monitoring anomalous
running processes, established network connections and network traffics [40]. Properly hiding these
three kinds of trace information allows transforming the Mirai attack into a persistent stealthy
attack. This kind of attack will grant more time to the attacker to perform more physical damages
to the system. Such extra time may be crucial for the success of the attack, as physical processes
usually evolve more slowly than cyber processes. Thus, the effects of an attack to a physical process
require more time to manifest.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
18 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
Processes:
1. Load Mirai to controller-1 (192.168.1.9)
2. Scan and report controller-2 (192.168.1.10)
3. Load Mirai to controller-2 (192.168.1.10)
4. Bots report device information
5. Bots attack actuators 6
6. Bots attack victim server (192.168.1.11)
(b)
(c)
Fig. 12. Experimental results of non-stealthy Mirai attack. The numbers are consistent with the ones in Figure
10. (a) Servers controlled by the attacker, including CNC server, scan listener, and loader server. (b) Actuators
working in safety before Mirai attack, on the left. Dangerous configuration of actuators forced by the Mirai
attack on the right. (c) The network package captured on the victim (192.168.1.11) after launching DDoS
attack shows that the victim was suffering from UDP flood from the bots(192.168.1.9 and 192.168.1.10).
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 19
Fig. 13. Architecture to make Mirai attack stealthy: the non-stealthy Mirai attack adopts Telnet to commu-
nicate with the CNC server, which will show Telnet traffic on the network. Stunnel hides the Telnet traffic
in the HTTPS traffic. Meanwhile, the Suterusu rootkit hides the traces of Mirai and Stunnel to potential
intrusion detection mechanisms.
(a)
(b)
Fig. 14. Behavior observed by sniffing the network during our experiments. (a) Unhidden Telnet traffic
captured by the network sniffer. (b) Hidden traffic in HTTPS captured by the network sniffer.
The issues caused to the system availability by the proposed variation of the Mirai attack are
twofold: one issue is strictly related to security, while the second concerns the safety of the system.
From the security point-of-view, the Mirai attack floods the system, making it unavailable to the
legitimate user. This, provides more time to the attacker to perform the malicious actions involving
the physical parts of the IIoT system. This is necessary because the reaction time of physical
(e.g., mechanical) processes is significantly slower than cyber actions. As such, the attacker may
need extra time to carry on the attack. The proposed attack is able to provide such extra-time
by compromising the availablity of the system interfaces through flooding. On the other hand,
Mirai can compromise the system availability from the safety point-of-view by forcing operations
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
20 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
that cause physical damages to the system. For instance, by moving the actuators into unsafe
configurations, as shown in our experimental analysis. It is important noticing that the safety
and security system availability issues are connected to each other. In fact, flooding the system
(security issue) gives the time to the attacker to bring the physical parts of the system into an
unsafe configuration (safety issue). This is due to the strong correlation between security and safety
that is a peculiar characteristic of IIoT systems.
The integrity of the system is compromised by the proposed Mirai attack. As long as the actuators
are controlled by a malicious user, the real-time constraints characterizing industrial systems can no
longer be guaranteed. Furthermore, gaining the control of the physical components of the system,
forcing them to unsafe states, violates the integrity of the system. It is worth noticing, also the
integrity issues are located at the intersection of system’s safety and security, highlighting once
more the strong connections between the two concepts in IIoT systems.
During our experimental analysis the Mirai attack allowed stealing reserved information from
the attacked devices. Thus, violating the confidentiality of the system. While in our experimental
analysis the stolen information was the device configuration, devices may contain largely more
sensible information. This is particularly true for systems embracing the most recent manufacturing
trend. For instance, when the IIoT system implementing the agile or reconfigurable manufacturing
paradigms, the configuration of the production system carries information about the product being
produced [35]. Consequently, an attacker able to steal the devices configuration, may be also end
up stealing information about the product. Such kind of leak may lead to significant economic
losses, especially when the products are covered by intellectual property, patent, etc..
The proposed variation of Mirai attack is able to violate the AIC triad. Furthermore, all the
violations are specifically oriented to the specific requirements typical of indutrial systems, and
thus of IIoT systems.
7 PROTECTION STRATEGIES
We can classify the vulnerabilities above into three categories: defective system design, malware
injection, and stealthy attack. Therefore, the protection strategies can be discussed from these three
aspects, respectively.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 21
discover and remove most of the malware. We have experimentally tested that it is possible to
identify non-stealthy Mirai attacks as abnormal system processes by adopting a simple whitelist-
based detection method.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
22 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
traditional system, establishing a secure and trusted execution area in the processor. Such an
environment is a promising alternative to VMMs for implementing detection methods based on the
analysis of the hardware events, such as those proposed for general purpose computing systems [45].
Such a solution should allow keeping the overhead low, as required by IIoT systems, while increasing
the chances of detecting stealthy malware.
8 CONCLUDING REMARKS
In this paper, we presented an experimental analysis about the possible threats of a device repre-
sentative for the IIoT field. We identified its attack surfaces to define some attack scenarios. Then,
we presented a new version of Mirai attack, tailored explicitly for industrial scenarios, and we
extended it to make it not easily identifiable to the defender. The experimental analysis highlighted
the vulnerability of modern production systems. By penetrating the system, we were able to control
actuators, thus potentially endangering the system itself, and eventually, the people interacting
with it. Finally, we sum up some possible state-of-the-art protection, and mitigation strategies that
may be taken into account for further research in the IIoT context to prevent the scenarios analyzed
during our experiments.
REFERENCES
[1] Jinesh Ahamed and Amala V Rajan. Internet of things (iot): Application systems and security vulnerabilities. In Proc. of
the 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 2016, pages 1–5. IEEE, 2016.
[2] Haneen Al-Alami, Ali Hadi, and Hussein Al-Bahadili. Vulnerability scanning of IoT devices in Jordan using Shodan. In
Proceedings of the 2nd International Conference on the Applications of Information Technology in Developing Renewable
Energy Processes & Systems (IT-DREPS), pages 1–6. IEEE, dec 2017.
[3] Cristina Alcaraz, Rodrigo Roman, Pablo Najera, and Javier Lopez. Security of industrial sensor network-based remote
substations in the context of the internet of things. Ad Hoc Networks, 11(3):1091–1104, 2013.
[4] Oxana Andreeva, Sergey Gordeychik, Gleb Gritsai, Olga Kochetova, Evgeniya Potseluevskaya, Sergey I Sidorov, and
Alexander A Timorin. Industrial Control Systems Vulnerabilities Statistics. Technical report, 2016.
[5] Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex
Halderman, Luca Invernizzi, Michalis Kallitsis, et al. Understanding the mirai botnet. In Proc. of USENIX Security
Symposium, pages 1092–1110, 2017.
[6] Roland Bodenheim, Jonathan Butts, Stephen Dunlap, and Barry Mullins. Evaluation of the ability of the Shodan search
engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection,
7(2):114–123, 2014.
[7] Sujit Rokka Chhetri, Nafiul Rashid, Sina Faezi, and Mohammad Abdullah Al Faruque. Security trends and advances in
manufacturing systems in the era of industry 4.0. In Proc. of IEEE/ACM International Conference on Computer-Aided
Design (ICCAD), 2017.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices 23
[8] John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, and Salvatore
Stolfo. On the feasibility of online malware detection with performance counters. In ACM SIGARCH Computer
Architecture News, volume 41, pages 559–570. ACM, 2013.
[9] Rainer Drath and Alexander Horch. Industrie 4.0: Hit or hype? IEEE industrial electronics magazine, 8(2):56–58, 2014.
[10] Arvind Easwaran, Anupam Chattopadhyay, and Shivam Bhasin. A systematic security analysis of real-time cyber-
physical systems. In Proc. of 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pages 206–213.
IEEE, 2017.
[11] Alasdair Gilchrist. Industry 4.0: the industrial internet of things. Springer, 2016.
[12] Joffrey Guilbon. Introduction to trusted execution environment: Arm’s trustzone, 2018. [Online; accessed 08-October-
2019].
[13] Rachana Ashok Gupta and Mo-Yuen Chow. Networked control system: Overview and research trends. IEEE transactions
on industrial electronics, 57(7):2527–2535, 2009.
[14] Scott Hilton. Dyn analysis summary of friday october 21 attack, 2016. [Online; accessed 6-November-2018].
[15] Isatou Hydara, Abu Bakar Md Sultan, Hazura Zulzalil, and Novia Admodisastro. Current state of research on cross-site
scripting (XSS)–A systematic literature review. Information and Software Technology, 58:170–186, 2015.
[16] Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. Stealthy malware detection through vmm-based out-of-the-box
semantic view reconstruction. In Proc. of the 14th ACM conference on Computer and communications security, pages
128–138. ACM, 2007.
[17] Arun Kanuparthi, Jeyavijayan Rajendran, and Ramesh Karri. Controlling your control flow graph. In Proc. of IEEE
International Symposium on Hardware Oriented Security and Trust (HOST), 2016, pages 43–48. IEEE, 2016.
[18] Kaspersky Lab. Security research: ThingsPro Suite âĂŞ IIoT gateway and device manager by Moxa | Kaspersky Lab
ICS CERT, 2019.
[19] Khaled N Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, and Dmitry Ponomarev. Ensemble learning
for low-level hardware-supported malware detection. In Proc. of International Workshop on Recent Advances in Intrusion
Detection, pages 3–25. Springer, 2015.
[20] Kirill Shipulin, Positive Technologies. Practical ways to misuse a router, 2017. [Online; accessed 8-Novemberl-2018].
[21] Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, and XiaoFeng Wang.
Effective and efficient malware detection at the end host. In Proc. USENIX security symposium, volume 4, pages 351–366,
2009.
[22] Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. Ddos in the iot: Mirai and other
botnets. Computer, 50(7):80–84, 2017.
[23] Michael J. Conway Tim Lee, Robert M.and Assante. Analysis of the cyber attack on the Ukrainian power grid. Electricity
Information Sharing and Analysis Center (E-ISAC), 2016.
[24] Jon R Lindsay. Stuxnet and the limits of cyber warfare. Security Studies, 22(3):365–404, 2013.
[25] Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, and Sarah Martin. Trustzone explained: Architectural
features and use cases. In Proc. of IEEE 2nd International Conference on Collaboration and Internet Computing (CIC),
pages 445–451. IEEE, 2016.
[26] NJCCIC. Blackenergy, 2017. [Online; accessed 3-October-2019].
[27] NJCCIC. Crashoverride, 2017. [Online; accessed 3-October-2019].
[28] NJCCIC. Havex, 2017. [Online; accessed 3-October-2019].
[29] NJCCIC. Stuxnet, 2017. [Online; accessed 3-October-2019].
[30] NJCCIC. Trisis/triton, 2017. [Online; accessed 3-October-2019].
[31] OWASP. Top 10 IoT Vulnerabilities, 2018. [Online; accessed 30-September-2019].
[32] Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh, and Dmitry Ponomarev. Malware-aware processors:
A framework for efficient online malware detection. In Proc. of IEEE 21st International Symposium on High Performance
Computer Architecture (HPCA), 2015, pages 651–661. IEEE, 2015.
[33] Nisarg Patel, Avesta Sasan, and Houman Homayoun. Analyzing hardware based malware detectors. In Proc. of the
54th Annual Design Automation Conference 2017, page 25. ACM, 2017.
[34] Diego Perez-Botero, Jakub Szefer, and Ruby B Lee. Characterizing hypervisor vulnerabilities in cloud computing
servers. In Proc. of the 2013 international workshop on Security in cloud computing, pages 3–10. ACM, 2013.
[35] Erik Puik, Daniel Telgen, Leo van Moergestel, and Darek Ceglarek. Assessment of reconfiguration schemes for Recon-
figurable Manufacturing Systems based on resources and lead time. Robotics and Computer-Integrated Manufacturing,
43:30–38, 2017.
[36] Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, and Stefano Zanero. An
Experimental Security Analysis of an Industrial Robot Controller. In Proc. of 2017 IEEE Symposium on Security and
Privacy (SP), pages 268–286. IEEE, 2017.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.
24 Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay
[37] Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. Security and Privacy Challenges in Industrial
Internet of Things. In Proc. of the 52nd IEEE/ACM Design Automation Conference (DAC), page 54. ACM, 2015.
[38] Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj PD, Setareh Rafatirad, and Houman Homay-
oun. Customized machine learning-based hardware-assisted malware detection in embedded devices. In Proc. of 17th
IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International
Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 1685–1688. IEEE, 2018.
[39] Hossein Sayadi, Nisarg Patel, Sai Manoj PD, Avesta Sasan, Setareh Rafatirad, and Houman Homayoun. Ensemble
learning for effective run-time hardware-based malware detection: A comprehensive analysis and classification. In
Proc. of 55th ACM/ESDA/IEEE Design Automation Conference (DAC), pages 1–6. IEEE, 2018.
[40] Hamdija Sinanovic and Sasa Mrdovic. Analysis of mirai malicious software. In Proc. of the International Conference on
Software, Telecommunications and Computer Networks, pages 1–5, 2017.
[41] Emiliano Sisinni, Abusayeed Saifullah, Song Han, Ulf Jennehag, and Mikael Gidlund. Industrial internet of things:
Challenges, opportunities, and directions. IEEE Transactions on Industrial Informatics, 14(11):4724–4734, 2018.
[42] John A Stankovic. Research directions for the internet of things. IEEE Internet of Things Journal, 1(1):3–9, 2014.
[43] Andrea Tundis, Wojciech Mazurczyk, and Max Mühlhäuser. A review of network vulnerabilities scanning tools. In
Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), pages 1–10, New
York, New York, USA, 2018. ACM Press.
[44] Emmanouil Vasilomanolakis, Jörg Daubert, Manisha Luthra, Vangelis Gazis, Alex Wiesmaier, and Panayotis Kikiras.
On the security and privacy of internet of things architectures and systems. In Proc. of International Workshop on
Secure Internet of Things (SIoT), 2015, pages 49–57. IEEE, 2015.
[45] Xueyang Wang and Ramesh Karri. Reusing hardware performance counters to detect and identify kernel control-flow
modifying rootkits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35(3):485–498,
2015.
[46] Rolf H Weber. Internet of things–new security and privacy challenges. Computer law & security review, 26(1):23–30,
2010.
[47] Jacob Wurm, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, and Yier Jin. Security analysis on consumer and
industrial iot devices. In Proc. of 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pages 519–524.
IEEE, 2016.
[48] Liwei Zhou and Yiorgos Makris. Hardware-based workload forensics: Process reconstruction via tlb monitoring. In
Proc. of IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016, pages 167–172. IEEE, 2016.
[49] Liwei Zhou and Yiorgos Makris. Hardware-based on-line intrusion detection via system call routine fingerprinting. In
Proc. of the IEEE/ACM Conference on Design, Automation & Test in Europe (DATE), pages 1550–1555. European Design
and Automation Association, 2017.
[50] Liwei Zhou and Yiorgos Makris. Hardware-assisted rootkit detection via on-line statistical fingerprinting of process
execution. In Proc. of the IEEE/ACM Design, Automation & Test in Europe Conference & Exhibition (DATE) 2018, pages
1580–1585. IEEE, 2018.
[51] Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, and Peng Liu. The effect of IoT new features on security and privacy:
New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal, 6(2):1606–1616, 2018.
ACM Trans. Internet Technol., Vol. 1, No. 1, Article . Publication date: January 2020.