Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roman Schlegel is active.

Publication


Featured researches published by Roman Schlegel.


international conference on industrial informatics | 2015

Structured system threat modeling and mitigation analysis for industrial automation systems

Roman Schlegel; Sebastian Obermeier; Johannes Schneider

Industrial control systems are an important part of critical infrastructures and their uninterrupted operation is important for many aspects of society. In recent years these systems have come under more scrutiny, as reports about attacks on them have become more frequent. There is therefore a need to better secure them, and the first step to achieve this is to identify the threat landscape for such systems. This is typically done by creating a threat model of a system, enumerating the potential threats, and then devising mitigation options based on the discovered threats. However, many of the available threat modeling methods and tools target very specific systems (e.g., software components), and do not lend themselves well to evaluating diverse systems or abstract reference architectures of systems. In this paper we present a methodology for system threat modeling that addresses this gap, by enabling the modeling of a diverse range of systems and reference architectures of systems. Furthermore, the methodology provides additional functionality, such as guiding the user in the completion of a threat model and automatically detecting unmitigated threats in a system. In addition, our methodology also takes mitigation into account by modeling the security components in a system. We have implemented the methodology in a web-based tool, and also evaluated the tool on a reference architecture of a complex automation system, validating both the approach and the tool.


ieee international conference on cyber technology in automation control and intelligent systems | 2014

Security assessment methodology for industrial control system products

Ana Hristova; Roman Schlegel; Sebastian Obermeier

Industrial control systems (ICS) are at the heart of critical infrastructures and security is therefore important for such systems. In order to determine the security level of existing and planned systems, ICS products should be efficiently and comprehensively assessed. In this paper we present a methodology for assessing the security of a product or a system that can be used by security experts and non-experts alike. The methodology contains specific and concrete security recommendations (what), a rationale for each recommendation (why) as well as concrete implementation guidance (how). The methodology aims to help product teams to quickly and efficiently assess the security level of their products, prioritize resources on future development efforts, and generate security requirements for future products. We validate the approach by applying a concrete instantiation of the methodology to a fictitious ICS product.


2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) | 2014

Automatic attack surface reduction in next-generation industrial control systems

Sebastian Obermeier; Michael Wahler; Thanikesavan Sivanthi; Roman Schlegel; Aurelien Monot

Industrial control systems are often large and complex distributed systems and therefore expose a large potential attack surface. Effectively minimizing this attack surface requires security experts and significant manpower during engineering and maintenance of the system. This task, which is already difficult for todays control systems, will become significantly more complex for tomorrows systems, which can reconfigure themselves dynamically, e.g., if hardware failures occur. In this article, we present a dynamic security system which can automatically minimize the attack surface of a control systems communication network. This security system is specifically designed for next-generation industrial control systems, but can also be applied in current generation systems. The presented security system adapts the necessary parameters of network and security controls according to the underlying changes in the control system environment. This ensures a better cyber security resilience against system compromise and reduces the attack surface because security controls will only allow data transfer that is required by the control application. Our evaluations for a next generation industrial control system and a current generation substation automation system show that the attack surface can be reduced by up to 90%, depending on the size and actual configuration of the control system.


workshop on information security applications | 2017

A security evaluation of IEC 62351

Roman Schlegel; Sebastian Obermeier; Johannes Schneider

Abstract IEC 62351 is an industry standard aimed at improving security in automation systems in the power system domain. It contains provisions to ensure the integrity, authenticity and confidentiality for different protocols used in power systems. In this article we look at the different parts of IEC 62351 and assess to what extent the standard manages to improve security in automation systems. We also point out some incongruities in the algorithms or parameters chosen in parts of the standard. Overall, we conclude that the standard can significantly improve security in power systems if applied comprehensively, but we also note that the need to preserve (partial) backwards-compatibility has led to some design choices that provide less security than could have been achieved with a more ambitious approach.


international conference on industrial informatics | 2013

Secure design of engineering software tools in Industrial Automation and Control Systems

Ana Hristova; Sebastian Obermeier; Roman Schlegel

Industrial Automation and Control Systems (IACS) used in critical infrastructure typically perform their tasks using embedded devices. While the security of the embedded devices during the operation of the system is naturally the focus of security considerations, the security of the engineering framework is often overlooked. In this paper, we model the trust boundaries of a typical engineering tool used in an IACS, identify security risks in this context, suggest mitigation techniques for end users, and finally propose an architecture that allows to implement secure engineering frameworks.


international conference on security and cryptography | 2015

A framework for incident response in industrial control systems

Roman Schlegel; Ana Hristova; Sebastian Obermeier

Industrial control systems are used to control and supervise plants and critical infrastructures. They are crucial for operation of many industries and even society at large. However, despite efforts to secure such systems, there are frequent reports of incidents that lead to problems because of human error (e.g., installing unauthorized software on a mission-critical machine) or even cyber attacks. While such incidents should be prevented in the first place, it is not feasible to achieve 100% security; therefore, operators should be prepared to deal with incidents promptly and efficiently if they occur. In this paper, we present a general methodology and framework for investigating incidents in industrial control systems. The methodology is supported by a tool to automate an investigation, especially to efficiently determine the state of files on a device after an incident. This enables faster recovery from incidents by being able to identify suspicious files and focus on the files that have been modified compared to the initially installed files, or a previously taken baseline. An evaluation confirms the applicability of the methodology for an embedded industrial controller and for an industrial control system.


ICS-CSR '15 Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research | 2015

Cyber security maintenance for SCADA systems

Johannes Schneider; Sebastian Obermeier; Roman Schlegel


Archive | 2016

Method For Intrusion Detection In Industrial Automation And Control System

Sebastian Obermeier; Roman Schlegel; Michael Wahler


ICS-CSR '15 Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research | 2015

Assessing the security of IEC 62351

Roman Schlegel; Sebastian Obermeier; Johannes Schneider


Archive | 2017

SECURE MOBILE ACCESS FOR AUTOMATION SYSTEMS

Roman Schlegel; Sebastian Obermeier

Collaboration


Dive into the Roman Schlegel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thanikesavan Sivanthi

Hamburg University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge