4 CONCLUSION
Several approaches have been proposed for securing
the digital supply chain. Certification has been advo-
cated as one of the most effective ways to ensure secu-
rity in components from different vendors. Hardware
Reverse Engineering (HRE) for uncovering vulnera-
bilities introduced through the digital supply chain in
OT components in CI is proposed as an additional,
complementary approach. The complexity of the dig-
ital supply chain ecosystem and the identified chal-
lenges create a need to address the issue of securing
the infrastructure from a resilience rather than strictly
a cybersecurity standpoint. Thus, cyber resilience has
emerged as a complementary priority that seeks to en-
sure that digital systems can maintain essential per-
formance levels, even while a cyber attack degrades
capabilities. The inclusion of a reverse engineering
subprocess within the equipment procurement pro-
cess followed by a DSO is possible, and is expected
to result in measurable improvement of bot cyberse-
curity and cyber resilience of digital substations in
the power industry. Future research includes the pilot
implementation of our proposed approach in a DSO
on one hand, the execution of laboratory experiments
for assessing the cybersecurity of IEDs and PMUs by
means of HRE, and the preparation of training mate-
rial for DSO technical staff on HRE.
ACKNOWLEDGEMENTS
This work has been funded by the Research Council
of Norway in part by Project no. 320932 “Reverse
Engineering som metodikk for verifikasjon av sikker-
het i digitale verdikjeder i en kritisk infrastruktur” and
in part by Project no. 310105 “Norwegian Centre for
Cybersecurity in Critical Sectors (NORCICS)”.
REFERENCES
Aarland, M. and Gjøsæter, T. (2022). Digital supply chain
vulnerabilities in critical infrastructure: A systematic
literature review on cybersecurity in the energy sector.
In Proceedings of the 8th International Conference on
Information Systems Security and Privacy - Volume 1:
ICISSP,, pages 326–333. INSTICC, SciTePress.
Alcaraz, C., Burmester, M., Cuellar, J., Huang, X.,
Kotzanikolaou, P., and Psarakis, M. (2019). Guest ed-
itorial special issue on secure embedded iot devices
for resilient critical infrastructures. IEEE Internet of
Things Journal, 6(5):7988–7991.
Assenza, G. et al (2019). White paper on industry expe-
riences in critical information infrastructure security:
A special session at critis. In Nadjm-Tehrani, S. (eds)
Critical Information Infrastructures Security. CRITIS
2019. Lecture Notes in Computer Science, vol 11777.
Springer, Cham.
Boyens, J., Smith, A., Bartol, N., Winkler, K., Holbrook,
A., and Fallon, M. (2022). Assessment of the Critical
Supply Chains Supporting the U.S. ICT Industry.
Brash, R. (2020). Protecting Embedded Systems in OT Cy-
ber Security. https://verveindustrial.com/resources/bl
og/protecting-embedded-systems-in-ot-cyber-securit
y/.
Cycuity Team (2022). Detect and prevent security vulnera-
bilities in your hardware root of trust. https://cycuity.
com/type/white paper/detect-and-prevent-security-v
ulnerabilities-in-your-hardware-root-of-trust/.
European Commission (2022). Proposal for a regula-
tion of the european parliament and of the council
on horizontal cybersecurity requirements for products
with digital elements and amending regulation (eu)
2019/1020.
https://ec.europa.eu/newsroom/dae/redirection/docu
ment/89543.
Fyrbiak, M., Strauß, S., Kison, C., Wallat, S., Elson, M.,
Rummel, N., and Paar, C. (2017). Hardware re-
verse engineering: Overview and open challenges. In
2017 IEEE 2nd International Verification and Security
Workshop (IVSW), pages 88–94.
Gunduz, M. Z. and Das, R. (2020). Cyber-security on smart
grid: Threats and potential solutions. Computer Net-
works, 169:107094.
IT Governance (2023). IT Governance’s Cyber Resilience
Framework. https://www.itgovernance.co.uk/cyber-r
esilience-framework.
Jacobs, N., Hossain-McKenzie, S., and Vugrin, E. (2018).
Measurement and analysis of cyber resilience for con-
trol systems: An illustrative example. In 2018 Re-
silience Week (RWS), pages 38–46.
Kott, A. and Linkov, I. (eds.) (2019). Cyber Resilience of
Systems and Networks. Springer.
McDonald, J. (2007). Substation automation basics - the
next generation. https://electricenergyonline.com/ene
rgy/magazine/321/article/Substation-Automation-B
asics-The-Next-Generation.htm.
Mottahedi, A., Sereshki, F., Ataei, M., Qarahasanlou, A. N.,
and Barabadi, A. (2021). Resilience estimation of
critical infrastructure systems: Application of expert
judgment. Reliability Engineering & System Safety,
215:107849.
National Cyber Security Centre (NCSC) (2022). Vendor se-
curity assessment: Assessing the security of network
equipment.
Nyg
˚
ard, A. R. and Katsikas, S. (2022). Sok: Combating
threats in the digital supply chain. In Proceedings
of the 17th International Conference on Availability,
Reliability and Security, ARES ’22, New York, NY,
USA. Association for Computing Machinery.
Nyg
˚
ard., A. R., Sharma., A., and Katsikas., S. (2022). Re-
verse engineering for thwarting digital supply chain
attacks in critical infrastructures: Ethical considera-
tions. In Proceedings of the 19th International Con-
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid
615