Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the interactive agenda for SecurityWeek’s 2020 Singapore ICS Cyber Security Conference (NOW VIRTUAL!) (View the full conference website here) (You can Register for virtual conference, online training and threat briefings here for just $495) [Agenda is being finalized and subject to minor changes]  All times are Singapore Time (SGT) (GMT +8)
Tuesday, June 16 • 1:15pm - 2:00pm
Public and Private, The Common Flaws in ICS Communication Protocols

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

ICS communication protocols play an important role in communicating with HMIs and PLCs or PLCs and engineering workstations. Due to the flourishing development of the industrial control industry, more and more ICS protocols are being proposed by different PLC vendors. Some ICS protocols are public, and some are private. But most ICS protocols have potential risks.

In our research, we analyze more than 7 ICS protocols which widely used in power, water, transportation, petroleum, manufacturing or kinds of critical infrastructure sectors. In those public and private ICS protocols, we found some common flaws which allow attacker can easy sniff ICS protocols traffic without communication encryption and perform ICS protocol attacks which like command injection or response injection on PLC without authentication and authorization. Also, we provide two command injection attack demo in one public and one private protocol, prove those common flaws will cause huge impacts to ICS.

Sometime, even we know the common flaws on ICS protocols, most ICS can’t patch or modify communication protocols settings because they need to keep operation running. Therefore, we suggest the defense strategy for ICS protocols without patch or modify any communication protocols setting which more effectively defend our ICS environment.

Speakers
avatar for Mars Cheng

Mars Cheng

Cyber Threat Researcher, IoT/ICS Security Research Labs, TXOne Networks and Trend Micro
Mars Cheng is a Cyber Threat Researcher with TXOne Networks’s IoT/ICS Security Research Labs and Trend Micro. His research interests include ICS/SCADA security, threat hunting for IoT and ICS/SCADA, cryptography, and Web/IoT/Mobile/ICS/SCADA penetration testing. Before joining TXOne... Read More →
avatar for Selmon Yang

Selmon Yang

Senior DPI engineer, TXOne Networks and Trend Micro
Selmon Yang is a senior DPI engineer at TXOne Networks and Trend Micro. He is responsible for parsing IT/OT Protocol, linux kernel programming and honeypot development and adjustment. Selmon also spoke at HITCON CMT and HITB.


Tuesday June 16, 2020 1:15pm - 2:00pm GMT+08
SecurityWeek Virtual Theater