Pin control attack

[2] Classic attacks against PLCs rely on modifying the device's firmware, its configuration parameters, or the execution flow of running processes.

A pin control attack targets the PLC's dynamic memory, where the device stores its I/O configuration.

[5] While these two attack vectors act differently, their concept is similar and both physically terminate the I/O from software access without a hardware interrupt, thus preventing their detection.

The experts discovered that an attacker who has compromised the PLC can tamper with the input and output without being detected and without alerting the operators monitoring the process through a human-machine interface (HMI).

[7] Embedded SoCs usually employ hundreds of pins connected to the electrical circuit.

The current design of Pin Multiplexing in hardware level raises security questions.

Thus, the OS will continue to carry out the write and read operations requested by the application without any error.