Contact Us Blog Register Login
PreEmptive -
  • Home
  • Products
    • Application Protection
      • Dotfuscator for .NET
        • Overview
        • Features
        • Compare Editions
        • Xamarin Protection
        • Videos & Resources
        • Pricing
        • Downloads
      • DashO for Android & Java
        • Overview
        • Features
        • Videos & Resources
        • Pricing
        • Downloads
      • JSDefender for JavaScript
        • Overview
        • Features
        • Online Demo
        • Pricing
        • Downloads
      • PreEmptive Protection for iOS
        • Overview
  • Support
    • Product Support
      • Dotfuscator for .NET
      • DashO for Android & Java
      • JSDefender for JavaScript
      • PreEmptive Protection for iOS
    • Resources
      • White Papers
      • Glossary
      • Videos
  • Solutions
    • App Protection Solutions
      • Mobile App Protection
      • Desktop & Server App Protection
      • General Data Protection Regulation (GDPR)
      • Security Development Lifecycle
      • Application Integrity Protection
      • Mobile RASP
      • PCI Mobile Payment Acceptance Security
  • Company
    • About
      • Why PreEmptive?
      • About Us
      • Careers
      • Blog
    • Contact
    • Legal

Protecting Utilities and Infrastructure with PreEmptive's .NET Solution, Dotfuscator

July 24, 2020 1226 Views Lina Berzinskas


Protecting Industrial Internet Applications

Bayshore Network Case Study

Today’s utilities, factories and other infrastructure are exposed to high risk. The software that controls many of these entities is not protected. In the last 20 years, the way industrial environments operate has completely changed. Many industrial systems were designed with permissive set-ups that assume only the “right people” in the “right place” would ever give instructions. Past systems were not built with exposure to the internet in mind, and as a result they relied on this “air gap” to limit access to only authorized personnel within the organization. The rate of innovation within technology and wireless systems has outpaced the rate of development in security features. Control centers have gotten better - high tech displays and more capability, but this has led to an exposure to untrusted environments… and in many cases this threat has not been addressed.

Bayshore Networks is a cyber security solutions provider that serves to fill this need in the industrial internet application space. They provide security solutions to factories and industrial controls, without forcing them to completely overhaul their systems. Their products help industries - like water and energy providers - secure data transfer within these environments. Bayshore’s unidirectional data diode, SCADAfuse, provides a bridge to enable communications from the facility to the controller’s platform securely.

Their Need

Bayshore’s product, SCADAfuse, protects SCADA (Supervisory Control and Data Acquisition) systems, i.e. the “control systems” of the plant or data center. SCADA systems are networks of computers and devices that monitor and control a plant’s systems, and allow operators to see and make changes to the state of the system, via graphical user interfaces (GUIs).

In a utility or factory, SCADA systems convert raw data received from sensors, gauges and pressure monitors into information and dashboards that are easier for controllers and operators to understand. These dashboards are control centers and provide the means to monitor and adjust settings. The dashboard applications are often exposed to the web. A hacker gaining unauthorized access to the control centers of power or water plants can issue dangerous instructions and initiate destructive activities and can potentially lock legitimate users out. While hacking techniques have become more refined, most data centers have no industrial control security policies in place. Hackers can discover vulnerable systems simply by scanning for them across the Internet, then penetrate them by using dictionaries of known passwords. This leaves the most critical pieces of a region’s power and water at risk.

SCADAfuse is the unidirectional data diode that serves as the “last line of defense” a control center has and utilizes a Windows graphical front end. The graphical front end is also exposed to potential attack, and Bayshore sought out a solution to protect this layer of their product.

Penetration Testing

Prior to protecting the GUI of SCADAfuse, the application was sent to a 3rd party pen testing team in Spain. The team was able to penetrate and compromise the tool, tampering with the application, and in the words of a developer “walked all over the code.”

After seeing the results of this pen test, the engineers chose PreEmptive Protection as the best way to mitigate reverse engineering and code tampering threats. By obfuscating the graphical front end of SCADAfuse, Bayshore was able to protect the exposed endpoint from bad actors entering through this vulnerable point.

Solution

After using Dotfuscator, the Windows front-end was no longer exposed. Even the developers who wrote the original code could not read the protected code after attempting to reverse engineer it. The program was understandable only to the developers and not to the outside world.

When asked about what factors contributed to choosing Dotfuscator, the lead Product Development Specialist described his ideal product: “I look for optimization of my time always. I don’t want to become an expert in any product. I just want to know enough to get it to do what I need it to do. And then not have to deal with it anymore. That’s the perfect product.” He went on to say, “The reason I chose to go with Dotfuscator is – since it’s been around for so long, I figured it was my best chance for success. It seems like you [PreEmptive] have the most history with Visual Studio. Comparing your competitors’ sheet with your sheet, it seems you had a richer feature set.”

Bayshore Technologies provides innovative security solutions to their clients. At PreEmptive, we take pride when another security solutions provider chooses our products to integrate into their product. Securing data centers, utility controls, and factory operating systems requires a multi-layered security strategy, and we are happy to contribute to one small part of it.

Visit our resources page for a PDF version of this case study.

Tweet
Share

Categories

  • Dotfuscator

  • Dotfuscator CE

  • DashO

  • JSDefender

  • Press Releases

  • Mobile Protection

  • Risk Management

  • Support Corner

Latest Blog Posts

Protecting Java applications that use Jackson for JSON



JSON is a standard format for sharing objects and data within an application. When working in Java, there is no built-in support for JSON processing. There are, however, several widely-used libraries and options to choose from. In this article, we will focus on Jackson, which is one of the most popular.

Read more

Protecting C# applications that use AutoMapper



AutoMapper is an object-to-object mapping system used by many of our customers. It aims to simplify and organize code responsible for sharing instance values from an object of one type to an object of a different type.

Read more

Inventa, Wireless Technology Company, Protects their Android Application with DashO



Inventa, a Wireless Technology Company, Protects their Android Application with DashO

The Beginnings of Inventa

Having worked in the wireless mobile technology domain in the US, Anand Virani, became intrigued by the growing tech and wireless trends and wanted to explore the field more for himself. He noticed a boom in the Internet of Things (IoT) and that smartphones were becoming more central to how people interacted with each other at home, in the office, and in public places. What if there was a way phones could connect with each other without the need for Internet or cloud access? Smartphones were the future and Virani was determined to make a profitable business model based on this new trend.

Read more

Surgical Theater Protects their Medical Applications with Dotfuscator



Surgical Theater Protects their Medical Applications with Dotfuscator

How It All Started

How is flying a fighter plane similar to performing neurosurgery? They have more in common than you’d think. In 2005, Monty Avisar and Alon Geri, two Israeli fighter pilots were assigned to work with Lockheed Martin to build a $50 million F-16 Flight Simulator program for the Israeli Air Force to improve hand-eye coordination skills for their pilots during combat. Avisar took on the role of project manager and Geri served as senior engineer; the project was a success.

Four years later in 2009, the two finished their military service in Israel and moved to Cleveland, Ohio. Their experience working in virtual reality applications inspired them to wonder where this technology could also be applied. With several connections to surgeons, the two came to understand the ins and outs of operation procedures; in a similar way, surgeons were also working on a battlefield. What if surgeons could also train like fighter pilots and preview their surgical procedure, much like a fighter pilot could pre-fly their mission? The surgeons could pre-plan the operation from every angle and every approach to increase their situational awareness. And a year later, Surgical Theater was born.

Read more

Integrating DashO into a Maven Build



Maven is perhaps the most widely-used project management tool for Java. Based on the Project Object Model (POM), it is used not only for compilation of source code, but also dependency management, documentation, running tests, packaging, deployment, and more. We are frequently asked if we have a Maven plugin for running DashO. Though we do not offer a specific Maven plugin, adding DashO to your Maven-based project is surprisingly easy by leveraging Ant.

Read more

preemptive logo

767 Beta Dr. Suite A
Mayfield Village, OH 44143

Tel: +1 440.443.7200

solutions@preemptive.com

Latest Blog Posts

Protecting Java applications that use Jackson for JSON

December 30, 2020
Read more

Protecting C# applications that use AutoMapper

November 18, 2020
Read more

Inventa, Wireless Technology Company, Protects their Android Application with DashO

November 10, 2020
Read more

Surgical Theater Protects their Medical Applications with Dotfuscator

October 30, 2020
Read more

GlobalMed Finds Success by Switching to JSDefender

October 21, 2020
Read more

Twitter

@baldbeardbuild @GirlsWhoCode @baldbeardbuild thanks so much for inspiring us to be BUILDERS in our own community!… https://t.co/U6AyqPDhsa Jan 14 • reply • retweet • favorite

Copyright © 2020 PreEmptive

  • Home
  • Contact Support
  • Blog
  • Contact
Scroll to Top

PreEmptive uses cookies to improve the functionality of our website. By using this site, you agree to the use of cookies.