Skip to main content

Showing 1–8 of 8 results for author: Niedermaier, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.08885  [pdf, other

    cs.CR

    Analysis of Industrial Device Architectures for Real-Time Operations under Denial of Service Attacks

    Authors: Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli

    Abstract: More and more industrial devices are connected to IP-based networks, as this is essential for the success of Industry 4.0. However, this interconnection also results in an increased attack surface for various network-based attacks. One of the easiest attacks to carry out are DoS attacks, in which the attacked target is overloaded due to high network traffic and corresponding CPU load. Therefore, t… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: First published in the 22nd International Conference on Information and Communications Security (ICICS 2020)

  2. PropFuzz -- An IT-Security Fuzzing Framework for Proprietary ICS Protocols

    Authors: Matthias Niedermaier, Florian Fischer, Alexander von Bodisco

    Abstract: Programmable Logic Controllers are used for smart homes, in production processes or to control critical infrastructures. Modern industrial devices in the control level are often communicating over proprietary protocols on top of TCP/IP with each other and SCADA systems. The networks in which the controllers operate are usually considered as trustworthy and thereby they are not properly secured. Du… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

    Comments: 2017 International Conference on Applied Electronics (AE)

  3. Network Scanning and Mapping for IIoT Edge Node Device Security

    Authors: Matthias Niedermaier, Florian Fischer, Dominik Merli, Georg Sigl

    Abstract: The amount of connected devices in the industrial environment is growing continuously, due to the ongoing demands of new features like predictive maintenance. New business models require more data, collected by IIoT edge node sensors based on inexpensive and low performance Microcontroller Units (MCUs). A negative side effect of this rise of interconnections is the increased attack surface, enable… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Journal ref: 2019 International Conference on Applied Electronics (AE)

  4. LICSTER -- A Low-cost ICS Security Testbed for Education and Research

    Authors: Felix Sauer, Matthias Niedermaier, Susanne Kießling, Dominik Merli

    Abstract: Unnoticed by most people, Industrial Control Systems (ICSs) control entire productions and critical infrastructures such as water distribution, smart grid and automotive manufacturing. Due to the ongoing digitalization, these systems are becoming more and more connected in order to enable remote control and monitoring. However, this shift bears significant risks, namely a larger attack surface, wh… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019)

  5. A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices

    Authors: Matthias Niedermaier, Dominik Merli, Georg Sigl

    Abstract: The Industrial Internet of Things (IIoT) has already become a part of our everyday life be it water supply, smart grid, or production, IIoT is everywhere. For example, factory operators want to know the current state of the production line. These new demands for data acquisition in modern plants require industrial components to be able to communicate. Nowadays, network communication in Industrial… ▽ More

    Submitted 12 August, 2019; originally announced August 2019.

    Journal ref: 2019 8th Mediterranean Conference on Embedded Computing (MECO)

  6. arXiv:1908.03964  [pdf, other

    cs.CR

    Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices

    Authors: Matthias Niedermaier, Martin Striegel, Felix Sauer, Dominik Merli, Georg Sigl

    Abstract: Communication between sensors, actors and Programmable Logic Controllers (PLCs) in industrial systems moves from two-wire field buses to IP-based protocols such as Modbus/TCP. This increases the attack surface because the IP-based network is often reachable from everywhere within the company. Thus, centralized defenses, e.g. at the perimeter of the network do not offer sufficient protection. Rathe… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

  7. arXiv:1904.04286  [pdf, other

    cs.CR

    CoRT: A Communication Robustness Testbed for Industrial Control System Components

    Authors: Matthias Niedermaier, Alexander von Bodisco, Dominik Merli

    Abstract: The number of interconnected devices is growing constantly due to rapid digitalization, thus providing attackers with a larger attack surface. Particularly in critical infrastructures and manufacturing, where processes can be observed and controlled remotely, successful attacks could lead to high costs and damage. Therefore, it is necessary to investigate Industrial Control System (ICS) devices li… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Comments: IEEE EBCCSP 2018 - 4th International Conference on Event-Based Control, Communication and Signal Processing

  8. Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

    Authors: Matthias Niedermaier, Thomas Hanka, Sven Plaga, Alexander von Bodisco, Dominik Merli

    Abstract: Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and… ▽ More

    Submitted 12 August, 2019; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: http://dx.doi.org/10.14236/ewic/ICS2018.3