Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ANTI-VIRUS DEVICE FOR INDUSTRIAL CONTROL SYSTEMS
Document Type and Number:
WIPO Patent Application WO/2019/204480
Kind Code:
A1
Abstract:
Method of detecting malware in a computer storage medium is described. The method involves connecting the computer storage medium to an air-gapped anti-malware device. Scanning the computer storage medium for malware.

Inventors:
JAQUES MARK (US)
Application Number:
PCT/US2019/027917
Publication Date:
October 24, 2019
Filing Date:
April 17, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CONOCOPHILLIPS CO (US)
International Classes:
G06F21/50; G06F21/55; G06F21/56; H04L9/28
Foreign References:
US20160234240A12016-08-11
US20150052365A12015-02-19
US20170034205A12017-02-02
EP2672414A12013-12-11
US20150052365A12015-02-19
Other References:
PAJARI G., ET AL.: "USB Flash Storage Threats and Risk Mitigation in an Air-Gapped Network Environment", CANSECWEST VANCOUVER, 2014, XP055643326
PAJARI G. ET AL.: "USB Flash Storage Threats and Risk Mitigation in an Air-Gapped Network Environment", CANSECWEST VANCOUVER, 2014, pages 1 - 4
See also references of EP 3782063A4
Attorney, Agent or Firm:
BERGER, Michael D. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A method of detecting malware in a computer storage medium, the method comprising:

connecting the computer storage medium to an air-gapped anti-malware device; and

scanning the computer storage medium for malware.

2. A method of detecting malware comprising:

connecting a computer storage medium to an anti-malware device, wherein the anti-malware device is air-gapped from an enterprise network; and

scanning the computer storage medium for malware.

3. A method of detecting malware comprising:

probing a computer storage medium with an anti-malware device, wherein the anti-malware device; and

scanning the computer storage medium for malware.

4. The method of one of claims 1, 2, or 3, wherein the computer storage medium is a USB storage device.

5. The method of one of one of the preceding claims, wherein the anti-malware device is a single board computer.

6. The method of one of one of the preceding claims, wherein the anti-malware device is powered by a battery.

7. The method of one of one of the preceding claims, wherein the anti-malware device includes a touchscreen interface.

7. The method of one of one of the preceding claims, further comprising:

providing result of the scanning to an end user.

8. The method of one of one of the preceding claims, wherein the anti-malware device is air-gapped from an enterprise network.

9. The method of one of one of the preceding claims, wherein the air-gapped anti-malware device is a single board computer.

10. The method of one of one of the preceding claims, wherein the air-gapped anti-malware device includes a touchscreen interface.

Description:
ANTI-VIRUS DEVICE FOR INDUSTRIAL CONTROL SYSTEMS

FIELD OF THE INVENTION

[0001] This invention relates to devices and methods for on-field detection of malware using small factor form low power devices.

BACKGROUND OF THE INVENTION

[0002] Malicious software (e.g., malware) presents a serious hazard to computer systems and devices. Types of malware include, but are not limited to, computer viruses, worms, Trojan horses, rootkits, keyloggers, spyware, ransomware and the like. Once present on a computing system or device, malware can appropriate personal, financial or otherwise sensitive information, and/or hinder or wholly prevent proper system performance. Despite efforts to block or remove malware from systems (cybersecurity), it is estimated that millions of computing systems are infected with some form of malware. The widespread presence of malware is due m part to the extent and diversity of malware variants in addition, many new malware variants are being constantly created, typically in increasing sophistication and complexity.

[0003] Cybersecurity is an important concern even in industrial and utility settings. Industrial control systems often cannot be scanned or patched due to uptime requirements or simply because legacy systems have no means of being updated.

Industrial control systems (ICS) generally refer to control systems used in industrial processing and production, public utility infrastructures, and private facility management. They are common in various industries including energy (e.g., electricity plant, nuclear reactor), water, and oil and gas.

[0004] A distributed control system (DCS) is one type of industrial control system utilized to monitor and control multiple sub-systems that are each responsible for localized processing and production. In a DCS architecture, control elements might be hierarchically distributed through the system to coordinate operation of lower-level processing and production equipment. A supervisory control and data acquisition (SCAD A) system is another type of industrial control system utilized to monitor and control remotely-located systems that might be distributed across wide geographic areas at multiple sites. In a SCADA architecture, a control center may collect data from the remotely-located systems and issue commands to control the equipment of these remotely -located systems.

[0005] Industrial control systems thus often include multiple interconnected components in signal communication with each other, either directly or across a network. A Process Control Network (PCN) is a communications network that is used to transmit instructions and data between control and measurement units and Supervisory Control and Data Acquisition (SCAD A) equipment. The components of industrial control systems may exchange communications to report and collect data as well as to issue and receive commands. Industrial control systems may also utilize access control mechanisms to identify, authenticate, and authorize components requesting access to another component in the system. For example, based on data received from remote stations, automated or operator-driven supervisory commands can be pushed to remote station control devices, which are often referred to as field devices. Field devices control local operations, such as opening and closing valves and breakers, collecting data from sensor systems, and monitoring the local environment for alarm conditions. Malware can cause major disruptions to industrial control systems.

[0006] Malware infection of an industrial control systems can have serious economic/safety repercussions. A malw are event on an industrial control system may impact a single device (e.g , a single operator human-machine interface), a system or series of devices (e.g., safety system, business planning and control system, heating, ventilation and air conditioning, etc.), a whole facility resulting in shutdown or unrevealed failure mode, a corporation (e.g., series malware infection spreads from ICS to corporate information technology).

[0007] While some facilities have robust anti-malware controls, others do not. Almost all facilities carry a high risk of malware delivery through USB media (e.g., memory stick, portable hard drive, cell phone, tablet, etc.). Most facilities use a two- step process to check USB media. Step one involves performing a virus scan using the corporate information technology (IT) systems. Step two involves performing a virus scan using the ICS anti-virus software. However, there are several issues with this approach. First, the use of full size IT PC's - desktop or laptop computers are often not desirable in the ICS environment. Moreover, the anti-virus software used is likely to be the same, rendering the second scan ineffective. Thirdly, most corporate IT systems are windows-based computers connected to the internet offering potential to infect a previously uninfected device.

SUMMARY OF THE INVENTION

[0008] This invention relates to devices and methods for on-field detection of malware using small factor form low power devices.

[0009] One example of a method for detecting malware in a computer storage medium includes: connecting the computer storage medium to an air-gapped anti malware device; and scanning the computer storage medium for malware

[0010] Another example of a method for detecting malware includes: connecting a computer storage medium to an anti-malware device, wherein the anti malware device is air-gapped from an enterprise network; and scanning the computer storage medium for malware.

[0011] Yet another example of a method for detecting malware includes: probing a computer storage medium with an anti-malware device, wherein the anti malware device; and scanning the computer storage medium for malware.

BRIEF DESCRIPTION OF THE DRAWINGS

[0012] The invention, together with further advantages thereof, may best be understood by reference to the following description taken in conjunction with the accompanying figures by way of example and not by way of limitation, in which:

[0013] FIG. 1 is a block diagram depicting an anti-malware device according to an embodiment of the present invention.

[0014] FIG. 2 is a flow chart according to an embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0015] Reference will now be made in detail to embodiments of the invention, one or more examples of which are illustrated in the accompanying drawings. Each example is provided by way of explanation of the invention, not as a limitation of the invention. It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the scope or spirit of the invention. For instance, features illustrated or described as part of one embodiment can be used on another embodiment to yield a still further embodiment. Thus, it is intended that the present invention cover such modifications and variations that come within the scope of the invention.

[0016] Currently, most industrial facilities use a two-layered approach for protecting its ICS:

• Scanning a Universal Serial Bus (USB) medium for malware using corporate IT

• Scanning the USB medium again upon insertion into a process control network (PCN) device.

There are several problems with this approach. First, the anti-malware software is likely to be the same software on both systems- rendering the second check null. Second, the corporate IT is typically a Windows® device connected to the internet and may well be already infected and could be re-infecting the USB medium with an undetected threat.

[0017] The present invention provides devices and methods for an independent and inexpensive layer of malware protection for industrial control systems. The two-layered approach can also be used but with clear distinction(s):

• USB medium scanned for malware using an“air gapped” anti-malware device

• USB medium scanned again upon insertion into a PCN device

As used herein, the term“air gap” or its related terms such as, but not limited to,“air gapped,”“air wall,” or“air gapping” is a network security measure employed to ensure that a secure (uninfected) computer network is physically isolated from unsecured (infected or potentially infected) networks or storage medium devices.

[0018] The air-gapped anti-malware (AGAM) device provides a protection layer that physically isolates ICS from an unsecured medium and can replace the use of corporate IT and/or conventional anti-malware solutions. According to one or more embodiments of the present invention, the air-gapped anti-malware device is relatively inexpensive (currently ~$100-$150 for parts) device that requires low power (can run off USB or 5v power supply or battery) for normal operations. Other advantages will be apparent from the disclosure herein.

[0019] An AGAM device according to the present invention can be based on a single board computer (SBC). Single Board Computers (SBCs) can include all of the processing and memory functions of a full-sized computer on a single Printed Circuit Board (PCB). In addition to having a smaller size than traditional computers such as a laptop or desktop computer, SBCs are also typically less expensive. Examples of recent SBCs include the Raspberry Pi module, the Intel Edison module, the Intel Galileo module, and the Arduino module.

[0020] The following SBC device is described for illustrative purposes. The example is not intended to be limiting.

[0021] According to one embodiment, the AGAM device is comprised of a 7” capacitive touch screen and a single board computer (Raspberry Pi 3 Model B) with the following hardware specifications :

1.2 GHZ Quad Core CPU

4 x USB2 Ports

1 GB Memory

16GB MicroSD Storage

HDMI (Unused)

10/100 Ethernet (Unused)

802.11h Wireless

Bluetooth (Unused)

The inputs (e.g., USB ports) and data transfer protocols (e.g., ethemet, wireless, Bluetooth) may be used to update the device’s software.

[0022] The principle purpose of the AGAM device is to offer an independent layer of malware protection for USB storage media through the deployment of an inexpensive hardware device. The device offers the following enhancements above and beyond the typical anti-virus provision:

• Independence from process control and corporate networks - the device can leverage guest Wi-Fi network for signature updates but is otherwise stand-alone. Even if a threat is detected, it is isolated from the corporate or facility networks.

• Dissimilar Anti-Virus Software - the installed Anti-Virus software is not in general use elsewhere and is therefore unlikely to duplicate scans performed by other windows host devices.

• Dissimilar Operating System - the Linux based operating system is far less susceptible to malware (but not impervious). With this in mind, the device can both scan attached USB mass media and can, on instruction, scan itself.

• Simple - any problems with the device operation or suspicions it has been compromised then it can be very quickly rebuilt.

[0023] The AGAM device can have any number of inputs commonly used to transfer digital data. These input interface types include, but are not limited to, USB®, Thunderbolt®, Firewire®, Secure Digital (SD) memory cards, and the like. FIG. 1 is a high-level process flow diagram that summarizes how the air-gapped anti malware device can detect malware stored in a USB® storage medium device. For purposes of this application, the different input interfaces are interchangeable unless otherwise noted. Once the USB® storage medium device is physically connected to the AGAM device, it is initially scanned (ScanUSB.sh).

[0024] Generally, some of the teachings herein are reduced to an algorithm that is stored on machine-readable media. The algorithm is implemented by the computer processing system and provides operators with desired output.

[0025] Referring to FIG. 1, a single board computer includes processor 101, memory 102, and interface 103. Processor 101 can include circuitry such as one or more processors for executing instructions and can include a microcontroller, a Field Programmable Gate Array (FPGA), hard-wired logic, analog circuitry and/or a combination thereof.

[0026] Memory 102 can include, for example, a Dynamic Random Access

Memory (DRAM) or other type of memory used to store computer-executable instructions for execution by processor 101. Memory 102 may also store data used by processor 101 in executing computer executable instructions. In one embodiment, processor 101 and memory 102 may be combined as a system on a chip (SoC).

[0027] Interface 103 allows a user to control the single board computer.

Suitable interfaces may include any combination of, screen, touchscreen, keyboard, mouse, and the like.

[0028] FIG. 2 illustrates a three-step scanning process according to an embodiment of the present invention:

STEP 1: Decryption and File Transfer

1. Insert the untrusted USB device into an enterprise computer a. OPTIONAL: Install and/or launch the associated decryption software to access the required partition

b. The device will automatically be scanned using the corporate anti-malware software

2. Insert a trusted USB device for exclusive use in on the Process Control Network

3. F ormat the trusted USB devi ce

4. Transfer only the required files from the untrusted device to the formatted, trusted device using file manager

5. Return the untrusted device to the owner

STEP 2: AGAM Malware Check

(Plug the PCN approved, trusted USB media into spare USB ports on the side of the device)

1. Initiate USB scan via AGAM interface

2. Update the AV signatures if you have a Wi-Fi Connection

3. Scan the USB media

Scanning results will be summarized to the screen on completion. Detailed logging is available in a log file or folder.

STEP 3: PCN Malware Check

1. Connect the PCN approved, trusted USB media into an PCN workstation or similar

2. Scan the USB media using the installed AGAM software

[0029] In support of the teachings herein, various analysis components may be used, including digital and/or analog systems. The digital and/or analog systems may be included, for example, in a processing device or system such as those described herein. The digital and/or analog systems may include components such as a processor, analog to digital converter, digital to analog converter, storage media, memory, input, output, communications link (wired, wireless, pulsed mud, optical or other), user interfaces, software programs, signal processors (digital or analog) and other such components (such as resistors, capacitors, inductors and others) to provide for operation and analyses of the apparatus and methods disclosed herein in any of several manners well-appreciated in the art. It is considered that these teachings may be, but need not be, implemented in conjunction with a set of computer executable instructions stored on a computer readable medium, including memory (ROMs, RAMs), optical (CD-ROMs), or magnetic (disks, hard drives), or any other type that when executed causes a computer to implement the method of the present invention. These instructions may provide for equipment operation, control, data collection and analysis and other functions deemed relevant by a system designer, owner, user or other such personnel, in addition to the functions described in this disclosure.

[0030] Elements of the embodiments have been introduced with either the articles“a” or“an.” The articles are intended to mean that there are one or more of the elements. The terms“including” and“having” and their derivatives are intended to be inclusive such that there may be additional elements other than the elements listed. The term“or” when used with a list of at least two items is intended to mean any item or combination of items.

[0031] It will be recognized that the various components or technologies may provide certain necessary or beneficial functionality or features. Accordingly, these functions and features as may be needed in support of the appended claims and variations thereof, are recognized as being inherently included as a part of the teachings herein and a part of the invention disclosed.

[0032] While the invention has been described with reference to exemplary embodiments, it will be understood that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications will be appreciated to adapt a particular instrument, situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the scope of the appended claims.