How unique is the code in critical systems?

Often times those involved in operating critical infrastructure are given a false sense of security when looking over the daily stream of vulnerability disclosures and patch information, as these feeds/lists seems to seldom contain anything specific about their...

Developer Liability

Recently, two members of the European Commission, Viviane Reding and Meglena Kuneva, proposed that the European Union’s (EU) consumer protection rules for physical products be extended to software.  This expansion of the consumer protection rules to include...

Code Quality in Critical Systems

This is a little deviation from our usual critical systems, but considering it is a tool that heavily influences whether a guilty person goes free or an innocent one goes to jail it seems critical to me.  In the State v. Chun case the defendant argued for analysis of...

Legislative Utopia

George Will wrote an interesting column on folly of government pursuing rules and executive actions to achieve impossible goals. Here is key paragraph in the typical Will style: Gulliver’s travels took him to the Academy of Lagado, where “professors...

Secure Windows

Yes, you read the title correctly. There is a new and improved security driven version of Windows being distributed. The National Institute for Standards and Technology, the Defense Information Systems Agency and the Center for Internet Security consulted on this...

Optimal Security Configuration

Some observations after going through the tedious process of creating and modifying Windows service policy checks for an upcoming Bandolier release… 1.) The value of the OS-level audit files is different than I first thought. I blogged about this last year after...

Portaledge: Detecting Cyber Attacks

Portaledge is Digital Bond’s control system security research project funded by the US Department of Energy. We recently issued the first release and are nearing the second, so this is a good time to discuss with practical examples, what Portaledge is, how it...

Quickdraw Update: Preprocessors and Detection Plugins

It’s been a little while since we’ve had a Quickdraw update, and I wanted to fill everyone in on how we’re doing and the approach we’re using. As we’ve described before we’re basing the project on the snort 2.8.x tree, and we could do...

Malware, Viruses, and Attackers hopping networks

Many of us in the Control System community feel pretty secure in the belief that our critical networks are not directly connected to the internet, and as such are insulated from attack. Apparently (and as oft has been stated) this is not sufficient protection, if the...

Thoughts on DHS ICSJWG

Two weeks ago I was fortunate, along with about one hundred others, to be invited to an initial planning meeting of DHS’s Industrial Control System Joint Working Group [ICSJWG]. Here are some thoughts after a few weeks to ponder what happened there. ICSJWG is...