on the cryptographic schemes is slightly different,
which, once more, depends on the MODBUS proto-
col and its properties.
2.2 Side Channel Attacks on ICS
ICS systems are affected by similar threat vectors as
with normal IT systems. Software errors, bugs, mal-
ware and relevant cyber-attacks affect ICS systems
(Kaspersky, 2014). The Stuxnet (Langner, 2011)
event, Flame (Munro, 2012) and Idaho’s demonstra-
tion of a cyber-attack gaining control of physical
components of the electric grid, are such examples
(Meserve, 2007).
As stated in (McLaughlin et al., 2016), ICSs have
specific types of vulnerabilities, such as the use of
micro-based controllers, the adoption of communica-
tion standards and protocols and the complex
distributed network architecture. Moreover, types of
attacks on ICS are wide and they can be broken down
into specific layers, namely the process layer, the
network, the software, the firmware and the hardware
layer (McLaughlin et al., 2016).
Concerning network layer attacks in ICS, which is
the scope of this paper, vulnerabilities can manifest in
multiple ways; most of which are similar threat
vectors with traditional IT systems. A PLC protocol,
ISO -TSAP was found vulnerable to replay attacks
due to lack of proper session handling (Beresford,
2011). MODBUS implementation rarely use any
form of encryption. Instead, they deliver commands
through unencrypted channels. Some attempts to en-
crypt MODBUS traffic involve Modbus TCP/IP (also
Modbus-TCP), which is simply the Modbus RTU
protocol with a TCP interface that runs on Ethernet
(Acromag, 2005). These implementation involves en-
crypted TCP/IP traffic that transfers MODBUS com-
mands to SCADA systems. DCS and SCADA server
software is, also, often out of date or misconfigured
and hence can be exploited (Nan et al., 2012).
2.3 Non-padded Cryptographic
Schemes
Symmetric encryption utilizes padding for block
ciphers, since blocks need to be multiples of specific
block sizes. Examples range from older triple-DES up
to AES-CBC and relevant encryption schemes. There
are, however, modes that do not require padding due
to effectively using block ciphers as stream ciphers.
For instance, CFB, GCM, OFB and CTR modes, used
by AES, do not require any special measures to hand-
le messages whose lengths are not multiples of the
block size. These modes work by XOR-ing the
plaintext with the output of the block cipher. The last
partial block of plaintext is XOR-ed with the first few
bytes of the last keystream block, producing a final
ciphertext block that is the same size as the final
partial plaintext block. In addition, RC4 (which is still
widely used despite being reported as potentially
vulnerable under various attacks shares the same
qualities with the modes above, which means that the
size of the input is equal to the size of the output.
These characteristics make the above mentioned
schemes suitable (i) for applications that require
identical sizes in plaintext and encrypted data, and (ii)
for applications that transmit data in streaming form
where it is inconvenient to add padding bytes
(Stallings, 2016).
However, these attributes also jeopardize the se-
curity and the privacy of the encrypted communica-
tion. For example, RC4, an algorithm used extensive-
ly in web-based applications (Chen et al., 2010), can
cause a leakage based on the length of the encrypted
packets, considering it vulnerable to side-channel at-
tacks (Imperva, 2015).
2.4 Existing Web HMIs with
Encrypted TCP MODBUS Ports
To support our arguments regarding the significance
of leaking industrial functionality over encrypted
TCP/ IP MODBUS executions, we opted to search for
MODBUS protocol systems (Zhou and Feng, 2005)
that may utilize unpadded encryption between a web
interface (HMI) and relevant MODBUS ports.
Shodan is a search engine that lets users search
and identify devices and systems connected to the
internet (Matherly, 2009). Shodan collects data
mostly on web servers (HTTP/HTTPS-port 80, 8080,
443, 8443), as well as FTP (port 21), SSH (port 22),
Telnet (port 23), SNMP (port 161), SIP (port 5060),
RTSP (port 554). Using Shodan, we mapped ICS
devices that actually listen to the Modbus port 502 for
MODBUS commands. In addition, we were able to
identify and classify the type of encryption-schemes
used by these devices for protection of data sent to
them over the internet.
Extensive research showed some interesting
results: Out of hundreds detected, approximately 50%
of machines listening for MODBUS commands used
web interfaces requiring usernames and passwords
without encryption; listening on HTTP ports. 27%
used SSH with a mixed cipher suite including block
and stream ciphers, 16% used SSL/TLS encryption
and 7% used other encryption schemes such as VPN.
Moreover, most of the SSH's ciphers were AES-CBC,
RC4, AES-GCM, 3DES-CBC which are all unpadded