Skip to main content
SHARE
Publication

Beyond Binary: Automated PLC Memory Forensics through RGB Image Analysis and Deep Learning

by Rima L Asmar Awad, Michael A Sprayberry, Irfan Ahmed, Mike Rogers, Juan Lopez Jr
Publication Type
Conference Paper
Book Title
Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection
Publication Date
Conference Name
Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection
Conference Location
Arlington, Virginia, United States of America
Conference Sponsor
IFIP WG 11.10
Conference Date
-

The introduction of Industry 4.0 and the evolution of industrial control systems (ICS) to adopt Internet-based technologies enhanced productivity, but have inadvertently increased their vulnerability to cyber-based malicious attacks. When an ICS system is compromised, security analysts need to identify the root cause quickly to start the recovery process and develop mitigation strategies to safeguard against future instances. Memory forensics is critical in the analysis process to ascertain what occurred. To date, approaches to analyze the persistent memory in ICS devices are limited, and almost nonexistent for volatile memory. This paper proposes an automated methodology, COMA, for PLC memory dump analysis using computer vision and deep learning techniques. Specifically, COMA converts the sequences of bytes in a PLC memory dump to RGB pixels and creates a deep learning model that learns the underlying patterns and features of pre-labeled forensic artifacts in images and segments them into distinct regions. COMA then uses the trained model to automatically segment new memory images and extract forensic artifacts. We evaluate COMA on a Schneider Electric Modicon M221 PLC involving two cyber-based attack scenarios: (i) code injection and (ii) code modification. The empirical results show that COMA can successfully detect attack artifacts in memory dumps in both scenarios.