Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, and Volker Roth
In Communications and Network Security (CNS), 2015 IEEE Conference on
full paper: IEEE Xplore, PDF
freie universität berlin /
secure identity research group
Equipped with the rights tools to find and access ICS, adversaries can download and analyze the code on a programmable logic controller (PLC). Adversaries can then analyze and modify the code and load it back onto the PLC in order to perform sabotage. This process can be performed online or it can be automated by means of malware that infects engineering workstations, similar to Stuxnet.
The miniature packaging plant is built from industrial components and from custom designed parts, produced with the help of a 3D printer.
The objective of the plant is to sort and fill smarties into round metal boxes with a snap lid. The color and the number of smarties is configurable through an Human Machine Interface (HMI). Sorting the smarties in a row is solved by a vibration bowl, where a stepper motor lets the bowl vibrate at a frequency that moves smarties from the inside up along a spiral slide until they drop onto a conveyor belt. After filling up the box a vacuum gripper places the lid on it, than two pneumatic cylinders closes the box. At the final station the box gets disposed by a five servo robotic arm. When a human hand is placed under the box, the robotic arm drops the box into the hand.
The control unit consists of a Simatic S7-313C PLC, a KTP 400 touch-sensitive color HMI, a CP 343 lean Ethernet module, a CP 341 RS-485 communication module and a PS 307 5A 24V DC power supply mounted upright on a top-at rail.
Malchow, Jan-Ole, Daniel Marzin, Johannes Klick, Robert Kovacs, and Volker Roth. "PLC Guard: A practical defense against attacks on cyber-physical systems." In Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 326-334. IEEE, 2015.