Obfuscation of function block diagrams

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
    96 Downloads (Pure)

    Abstract

    Obfuscation is a process of transforming a program into an equivalent version which is harder to understand and reverse-engineer. Little attention has been paid to obfuscation techniques for programs written for programmable logic controllers (PLC). However, there is no reason to assume that an attacker would not be interested in hiding malicious payload into a PLC program before it is compiled to machine code.
    In this paper, I present five techniques for obfuscating IEC 61131-3 Function Block Diagram (FBD) programs. Four of the techniques are specific to the graphical representation of FBD. I then evaluate the applicability of each technique by experimenting with different PLC programming tools. I prove that at least four of the techniques are practically applicable, and demonstrate features that some tools successfully use to prevent abuse. Stricter rules, if implemented in IEC 61131-3, would prevent some of the techniques listed.
    Original languageEnglish
    Title of host publication2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages1-7
    Number of pages7
    ISBN (Electronic)979-8-3503-3991-8, 979-8-3503-3990-1
    ISBN (Print)979-8-3503-3992-5
    DOIs
    Publication statusPublished - 15 Sept 2023
    MoE publication typeA4 Article in a conference publication
    Event2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA) - Sinaia, Romania
    Duration: 12 Sept 202315 Sept 2023

    Conference

    Conference2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)
    Period12/09/2315/09/23

    Keywords

    • Cyberattack
    • Embedded software
    • Intellectual property
    • Programmable logic devices

    Fingerprint

    Dive into the research topics of 'Obfuscation of function block diagrams'. Together they form a unique fingerprint.

    Cite this