SECS/GEM标准攻击方法与实践

THE METHODOLOGY AND PRACTICE OF ATTACKING SECS/GEM STANDARD

  • 摘要: 在目前的半导体生产环境中,普遍采用SECS/GEM标准实现计算机系统与生产机台的交互。然而,目前少有针对SECS/GEM标准的安全性研究。针对这种情况,设计拒绝服务、信息窃取、流量伪造三种威胁场景六个攻击实验。攻击实验模拟了与生产机器位于同一局域网下的攻击者的行为,从链路层、网络层、传输层、应用层四个攻击面着手,对采用SECS进行通信的生产网络和生产机器进行渗透和控制。实验结果表明,SECS/GEM标准的设计并没有将安全机制作为必要的因素,普遍缺乏内生的安全性,具有明显的脆弱性。

     

    Abstract: SECS/GEM standard is widely-used in the contemporary semiconductor manufactory environment to deal with the communication between hosts and equipment. However, few works have been done with respect to the security issues of SECS/GEM standard. To fill the research gap, three threatening scenarios comprising deny of service, information theft, and traffic tampering and six attack experiments were designed. The attacking experiments simulated the behavior of an attacker who was in the same LAN as the manufactory equipment and tried to penetrate the network and to control the equipment in four different OSI layers including link layer, network layer, transport layer and application layer. The result shows that security mechanism is not included in the design of SECS/GEM standard and the standard is extremely insecure and fragile.

     

/

返回文章
返回