通信学报2024,Vol.45Issue(6):60-74,15.DOI:10.11959/j.issn.1000-436x.2024104
工控协议安全研究综述
Survey on industrial control protocol security research
摘要
Abstract
The security of industrial control protocol is the cornerstone to ensure ICS's stable operation,a large number of industrial control protocols in the design phase ignore the consideration of security,resulting in most of the main-stream industrial control protocols generally having vulnerabilities.Considering the ICS architecture and the develop-mental characteristics of industrial control protocols,the various vulnerabilities and attack threats commonly faced by in-dustrial control protocols were systematically summarized.At the same time,for the unknown potential vulnerabilities of industrial control protocols,the vulnerability mining techniques of industrial control protocols were analyzed in-depth,including the static symbolic execution-based,code audit-based,and fuzzing-based.The protocol design security protec-tion technology was comprehensively dissected from the three directions of industrial control protocol specification de-sign,communication mechanism,and third-party middleware.In addition,the future development trend of industrial con-trol protocol security was further prospected from the aspects of sandbox development,security protection,and vulner-ability mining.关键词
ICS/工控协议/协议脆弱性/安全防护/漏洞挖掘Key words
ICS/industrial control protocol/protocol vulnerability/security protection/vulnerability mining分类
信息技术与安全科学引用本文复制引用
黄涛,王郅伟,刘家池,龙千禧,况博裕,付安民,张玉清..工控协议安全研究综述[J].通信学报,2024,45(6):60-74,15.基金项目
国家重点研发计划基金资助项目(No.2023QY1202) (No.2023QY1202)
国家自然科学基金资助项目(No.U1836210,No.62372236) (No.U1836210,No.62372236)
海南省重点研发计划基金资助项目(No.GHYF2022010)The National Key Research and Development Program of China(No.2023QY1202),The National Natural Sci-ence Foundation of China(No.U1836210,No.62372236),The Key Research and Development Program of Hainan Province(No.GHYF2022010) (No.GHYF2022010)