place TDPs, and will also suggest potential responses
for common or similar events.
7 CONCLUSIONS
In this paper, we highlighted the security threat posed
by edge devices in a SCADA network, and pro-
posed our TEDDI system as a means of addressing
this threat. SCADA networks must handle a wide
range of tamper events while supporting a specialized
combination of security goals, and we showed how
TEDDI’s distributed nature, use of factor graphs, and
flexible approach to tamper response give it a distinct
advantage in handling these event and goals.
ACKNOWLEDGEMENTS
This material is based upon work supported by the
Department of Energy under Award Number DE-
OE0000097. The views expressed in this paper are
those of the authors, and do not necessarily reflect the
views of the sponsors.
REFERENCES
Atmel Corporation (2015). Atmel Trusted Platform Mod-
ule. Available at: http://www.atmel.com/products/se
curity-ics/embedded/default.aspx (Accessed 2 March
2015).
Berthier, R. and Sanders, W. (2013). Monitoring advanced
metering infrastructures with Amilyzer. In Cyberse-
curity of SCADA and Industrial Control Systems.
Cao, P., Badger, E., Kalbarczyk, Z., Iyer, R., and Slagell, A.
(2015). Preemptive intrusion detection: Theoretical
framework and real-world measurements. In Sympo-
sium and Bootcamp on the Science of Security.
Desai, A. (2013). Anti-counterfeit and anti-tamper imple-
mentation using hardware obfuscation. Master’s the-
sis, Virginia Polytechnic Institute and State Univer-
sity.
Dragone, S. (2013). Physical security protection based on
non-deterministic configuration of integrated micro-
electronic security features. In The First International
Cryptographic Module Conference.
Frey, B. (2003). Extending factor graphs so as to unify di-
rected and undirected graphical models. In Proceed-
ings of the Nineteenth Conference on Uncertainty in
Artificial Intelligence.
IBM (2011). IBM 4765 PCIe Data Sheet. Available at: htt
p://www-03.ibm.com/security/cryptocards/pciecc/pdf
/PCIe
Spec Sheet.pdf (Accessed 2 March 2015).
Organization for the Advancement of Structured Informa-
tion Standards (2013). eXtensible Access Control
Markup Language (XACML) Version 3.0. Available
at: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-co
re-spec-os-en.pdf (Accessed 2 March 2015).
Pearl, J. (1988). Probabilistic Reasoning in Intelligent
Systems: Networks of Plausible Inference. Morgan
Kauffman.
Peterson, D. (2013). Why Crain / Sistrunk vulns are a big
deal. Digital Bond. Available at: http://www.digitalb
ond.com/blog/2013/10/16/why-crain-sistrunk-vulns-a
re-a-big-deal/ (Accessed 2 March 2015).
Reeves, J. and Smith, S. W. (2014). Tamper event detec-
tion on distributed devices in critical infrastructure. In
ICMC 2014: The Second International Cryptographic
Module Conference.
Roblee, C., Berk, V., and Cybenko, G. (2005). Large-scale
autonomic server monitoring using process query sys-
tems. In IEEE International Conference on Autonomic
Computing.
Smith, R. (2014). U.S. risks national blackout from small-
scale attack. Wall Street Journal. Available at: http:
//online.wsj.com/news/articles/SB100014240527023
04020104579433670284061220 (Accessed 2 March
2015).
Smith, S. W., Palmer, E., and Weingart, S. (1998). Using
a high-performance, programmable secure coproces-
sor. In Second International Conference on Financial
Cryptography.
Smith, S. W. and Weingart, S. (1999). Building a
high-performance, programmable secure coprocessor.
Computer Networks, 31(1999):831–860.
Solomakhin, R. V. (2010). Predictive YASIR: High security
with lower latency in legacy SCADA. Master’s thesis,
Dartmouth College.
Sousan, W. L., Zhu, Q., Gandhi, R., and Mahoney, W.
(2013). Smart grid tamper detection using learned
event patterns. In Pappu, V., Carvalho, M., and Parda-
los, P., editors, Optimization and Security Challenges
in Smart Power Grids, Energy Systems, pages 99–
115. Springer Berlin Heidelberg.
Tygar, J. D. and Yee, B. (1994). Dyad: A system for us-
ing physically secure coprocessors. In Technological
Strategies for the Protection of Intellectual Property
in the Networked Multimedia Environment.
Valdes, A. and Skinner, K. (2001). Probabilistic alert corre-
lation. In Recent Advances in Intrusion Detection.
Wang, Y. and Hauser, C. (2011). An evidence-based
Bayesian trust assessment framework for critical-
infrastructure decision processing. In Fifth Annual
IFIP Working Group 11.10 International Conference
on Critical Infrastructure Protection.
Zonouz, S., Khurana, H., Sanders, W., and Yardley, T.
(2014). RRE: A game-theoretic intrusion response
and recovery engine. IEEE Transactions on Parallel
and Distributed Systems, 25(2):395–406.
Zonouz, S., Rogers, K., Berthier, R., Bobba, R., Sanders,
W., and Overbye, T. (2012). SCPSE: Security-
oriented cyber-physical state estimation for power
grid critical infrastructures. IEEE Transactions on
Smart Grid, 3(4):1790–1799.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
316