Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis



Similar documents
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Security risk analysis approach for on-board vehicle networks

Vehicular On-board Security: EVITA Project

The research area of SET group is software engineering, and model-based software engineering in particular:

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Security in Vehicle Networks

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

The Vision of Vehicle Infrastructure Integration (VII)

Automotive and Industrial Data Security

Car Connections. Johan Lukkien. System Architecture and Networking

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

Hardware Security Modules for Protecting Embedded Systems

Trust areas: a security paradigm for the Future Internet

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

The relevance of cyber-security to functional safety of connected and automated vehicles

Research Projects in the Mobile Computing and Networking (MCN) Lab

Security architecture Integrating security into the communicating vehicle. Norbert Bissmeyer, Fraunhofer SIT June 18 th 2015

Trends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008

Automotive Communication via Mobile Broadband Networks

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

agenda Why Business Modeling? Framework Structure Involved Players Application Overview Exemplary Application Aggregated Perspective

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Certificate Revocation Management in VANET

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Automotive Software Development Challenges Virtualisation and Embedded Security

5 TH C-ITS PLUGTEST 2016 USE CASES V01. Contact

Security Threats in Demo Steinkjer

Technical Document on Vehicular Networks

Challenges for the European Automotive Software Industry

Threat Modeling. 1. Some Common Definition (RFC 2828)

White Paper How are thieves stealing modern vehicles?

Cloud security architecture

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Common platform for automated trucks and construction equipment

Vehicular Cloud. Fan Zhang

Information Security Basic Concepts

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

A New Security Mechanism for Vehicular Communication Networks

Star rating driver traffic and safety behaviour through OBD and smartphone data collection

Cryptography and Network Security Chapter 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Cisco Positive Train Control: Enhancing End-to-End Rail Safety

Securing Digital Processes


1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Connecting things. Creating possibilities. A point of view

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

ETSI TR V1.1.1 ( ) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

BENEFIT OF DYNAMIC USE CASES TO EARLY DESIGN A DRIVING ASSISTANCE SYSTEM FOR PEDESTRIAN/TRUCK COLLISION AVOIDANCE

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

OVERVIEW OF THE PROJECT...

Automotive HMI: Current status and future challenges

GPS Tracking System for Fleet Management. GPS / GSM Control Management Portal

USB Portable Storage Device: Security Problem Definition Summary

Securing Wireless Access for Vehicular Environments (WAVE)

Security within a development lifecycle. Enhancing product security through development process improvement

Maruleng Local Municipality

Leveraging Tizen IVI Platform for Realizing V2X Use Cases

Technologies and Techniques for Collecting Floating Car Data. Mike Hayward Head of Vehicle Telematics WS Atkins Transport Systems

Towards End-to-End Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Threat Modelling and Risk Assessment Within Vehicular Systems

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Vehicular Networks Security, Vulnerabilities and Countermeasures. Master of Science Thesis in the program Networks and Distributed Systems

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Wireless traffic Safety network between Cars. CoMoSeF TULEVAT TRENDIT AUTOJEN M2M KOMMUNIKAATIOSSA WISAFECAR JA COMOSEF PROJEKTIT

A Model-based Methodology for Developing Secure VoIP Systems

Cyber Security for SCADA/ICS Networks

Wireless M2M Communication and AMR Now in the second edition completely updated and revised

M2M ATDI services. M2M project development, Business model, Connectivity.

Secure Data Exchange Solution

ESKISP Conduct security testing, under supervision

Security Issues with Distributed Web Applications

The SPES Methodology Modeling- and Analysis Techniques

Security Testing. How security testing is different Types of security attacks Threat modelling

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

GE Measurement & Control. Cyber Security for NEI 08-09

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25

Traffic Management and Network Marketing Business Case

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group

Security Engineering for VANETs

HANDBOOK 8 NETWORK SECURITY Version 1.0

Enhancing Organizational Security Through the Use of Virtual Smart Cards

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Using big data in automotive engineering?

Performance Evaluation of Intrusion Detection Systems

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Vehicle Tracking System using GPRS

This guide will show you how to configure a Windows Mobile 6 PDA for Bluetooth connection to the KBM Systems OBDKey Bluetooth device.

Evaluation of different Open Source Identity management Systems

Big data in the vehicle: another brick in the wall? Intelligent transportation in the era of big data

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Supplier Security Assessment Questionnaire

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Transcription:

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany Jun 2009 Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 1 / 16

Overview 1 Motivation Scenario - cooperative reasoning in vehicular ad hoc communication Dependence of safety critical decisions raises security concerns 2 Objectives Systematic security requirements elicitation for novel architectures Avoid premature architecture constraints 3 Functional Security Analysis 4 Results and Outlook Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 2 / 16

Why think about new vehicular Architecture using SoS reasoning overall goal reduce number and impact of accidents in Europe difficulties to improve safety measures in vehicles improve infrastructure cooperative approach warning vehicular communication systems can be more effective in avoiding accidents and traffic congestion than current technologies where each vehicle tries to solve these problems individually Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 3 / 16

Use case: send danger warning sense(esp,slipperywheels) positioning(gps,position) receive(cu,danger(position,type)) positioning(gps,position) send(cu,danger(position,type)) show(hmi,d,warn(relative-position)) ESP - Electronic Stability Protection GPS - Global Positioning System CU - CommunicationUnit HMI - Human Machine Interface D - Driver Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 4 / 16

Security is an enabling Technology for novel SoS Applications Exposing vehicles to the Internet makes them vulnerable Attacks on safety Unauthorized brake Attack active brake function Tamper with warning message Attacking E-Call On-Board Diagnostics (OBD) flashing attack Attacks on privacy Trace vehicle movement Compromise driver privacy Manipulate traffic flow Simulate traffic jam for target vehicle Force green lights ahead of attacker Manipulate speed limits Prevent driver from passing toll gate Engine refuses to start Increase/Reduce driver s toll bill Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 5 / 16

Security Requirements Engineering Process the identification of the target of evaluation and the principal security goals and the elicitation of artifacts (e.g. use case and threat scenarios) as well as risk assessment the actual security requirements elicitation process a requirements categorisation and prioritisation, followed by requirements inspection Further steps in Security Engineering security requirements (structural) refinement mapping of security requirements to security mechanisms Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 6 / 16

Methods to elicit security requirements misuse cases (attack analysis), anti-goals derived from negated security goals, use Jackson s problem diagrams, actor dependency analysis (i approach) Why yet another approach? Completeness Avoid premature architecture constraints protocols SSL/TLS/VPN/IPv6 trust anchor TPM infrastructure PKI, PDP/PEP end-to-end/hop-by-hop Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 7 / 16

Functional Component Model Vehicle-Component Security goal of the system at stake: Whenever a certain output action happens, the input action that presumably led to it must actually have happened. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 8 / 16

Functional Component Model Vehicle-Component Security goal of the system at stake: Whenever a certain output action happens, the input action that presumably led to it must actually have happened. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 8 / 16

Functional security requirement identification Vehicle 0 Vehicle w Formally, the functional flow among actions can be interpreted as an ordering relation ζ i on the set of actions Σ i in a certain system instance i. ζ 1 = { (positioning(gps w,pos),show(hmi w,d w,warn(relpos))), (rec(cu w,danger(pos,type)),show(hmi w,d w,warn(relpos))), (send(cu 0,danger(pos,type)),rec(CU w,danger(pos,type))), (sense(esp 0,SlipWheels),send(CU 0,danger(pos,type))), (positioning(gps 0,pos),send(CU 0,danger(pos,type)))} Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 9 / 16

Functional security requirement identification Vehicle 0 Vehicle w Restrict ζ i to outgoing (max i ) and incoming boundary actions (min i ). χ i = {(x,y) Σ i Σ i (x,y) ζ i x min i y max i } χ 1 = { (sense(esp 0,SlipWheels),show(HMI w,d w,warn(relpos))), (positioning(gps 0,pos),show(HMI w,d w,warn(relpos))), (positioning(gps w,pos),show(hmi w,d w,warn(relpos)))} For all x,y Σ i with (x,y) χ i : auth(x,y,stakeholder(y)) is a requirement. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 9 / 16

Resulting Authenticity Requirements For all possible SoS instances for the action show(hmi w,d w,warn(relpos)) it must be authentic for the driver that: 1 auth(positioning(gps w,pos),show(hmi w,d w,warn(relpos)),d w ) the relative position of the danger she is warned about is based on correct position information of her vehicle 2 auth(positioning(gps 0,pos),show(HMI w,d w,warn(relpos)),d w ) the position of the danger she is warned about is based on correct position information of the vehicle issuing the warning 3 auth(sense(esp 0,SlipWheels),show(HMI w,d w,warn(relpos)),d w ) the danger she is warned about is based on correct sensor data Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 10 / 16

System of Systems Instances Vehicle 0 Vehicle w Vehicle 1 Vehicle 2 An analysis for the second instance will result in: χ 2 = χ 1 {(positioning(gps 1,pos),show(HMI w,d w,warn(relpos)))} And the third system of systems instance will result in: χ 3 = χ 2 {(positioning(gps 2,pos),show(HMI w,d w,warn(relpos)))} χ i = χ i 1 {(positioning(gps i 1,pos),show(HMI w,d w,warn(relpos)))} Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 11 / 16

Resulting Authenticity Requirements For all possible SoS instances for the action show(hmi w,d w,warn(relpos)) it must be authentic for the driver that: 1 auth(positioning(gps w,pos),show(hmi w,d w,warn(relpos)),d w ) the relative position of the danger she is warned about is based on correct position information of her vehicle 2 auth(positioning(gps 0,pos),show(HMI w,d w,warn(relpos)),d w ) the position of the danger she is warned about is based on correct position information of the vehicle issuing the warning 3 auth(sense(esp 0,SlipWheels),show(HMI w,d w,warn(relpos)),d w ) the danger she is warned about is based on correct sensor data 4 V x V forward : auth( positioning(gps x,pos),show(hmi w,d w,warn(relpos)),d w ) position of forwarding vehicles is authentic Breaking (4) would result in a smaller or larger broadcasting area. This cannot cause the warning of a driver that should not be warned. So it is NOT a safety related authenticity requirement. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 12 / 16

DSRC Receive (Neighborhood Information) DSRC Receive (C2X Message(Emergency)) Environment Sensing (Environment Information) Chassis Sensing (Vehicle Dynamics) DSRC Receive (Cooperative Aware ness Message) DSRC Receive (Traffic Information Message) Sensing (Data) GPS Sensing (Position) HMI Read(POI Configuration) Receive(POI Info) USB Receive(Software) HIM Read(Inputs) BT Receive(Display(Data)) HIM Read(Inputs) BT Receive(SeatPosition) Receive(Diagnosis Request) Forwarding Message = True Danger Avoidance > Emergency Braking = true Processing > Warning=true??Possible CSC Processing?? Processing >ShowInfo=true Situation Assessment > Emergeny = true Processing >critical situation recognition = true Aggregation Collecting >TollRoad > Calculation=true Crash calculation = true Show POI = true Execution DSRC Send (Neighborhood Token) DSRC Forward (C2X Msg(Emergency)) Brake Driving Power Reduction DSRC Send (C2X Msg(Emergency)) HMI Display (Warning) HMI/Navigation Display (Warning) PTC Action(???) DSRC Send (Cooperative Awareness Msg) Send (Traffic Information Msg) GSM Send (Billing Information)? Send (Crash Info,Position) HMI Show(POI Info) HIM Show(SW Interface) HIM Show(Data) BT Send(Inputs) Adjust(SeatPosition) Send(Diagnosis Data) EVITA (E-Safety Vehicle Intrusion Protected Applications) In practice, the method has been applied in EVITA a to derive authenticity requirements for a new automotive on-board architecture 17 additional use cases, e.g. safety reaction: active brake traffic information e-tolling ecall remote car control remote diagnosis/flashing 29 authenticity requirements elicited system model comprising 38 component boundary actions 16 system boundary actions (9 max, 7 min elements) Functional System Model Pattern UseCase #1 #2 #3 #4 #5 #6 #7 #8 RSU TOE #9 BT Receive(OpenHood) Open(Hood) #10 #11 #12 #13 POI Provider Service Provider #14 Replacement of ECU #15 Addition of ECU #16 DSRC Receive(Firmware) #17 Diag Receive(Firmware) #18 Manufacturer Maintainance Shop Mobile Device a http://www.evita-project.org/deliverables/evitad2.3.pdf Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 13 / 16

Contribution of proposed approach Identification of a consistent and complete set of authenticity requirements For every safety critical action in a system of systems all information that is used in the reasonig process that leads to this action has to be authentic Security mechanism independence avoid to break down the overall security requirements to requirements for specific components or communication channels prematurely requirements are independent of decisions on concrete security enforcement mechanisms and structure (e.g. hop-by-hop, end-to-end) Formal base approach fits to formal definition of security requirements Authenticity: A set of actions Γ Σ is authentic for P P after a sequence of actions ω S with respect to W P if alph(x) Γ /0 for all x λ 1 P (λ P(ω)) W P. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 14 / 16

Future work derivation of confidentiality requirements in a similar way (privacy) non-repudiation (relevant security goals from law) refinement throughout the design process (paper submitted to STM 09) mapping to adequate architectural structure and mechanisms to implement security measures (within EVITA context) Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 15 / 16

Thank you Part of the work presented in this paper was developed within the project EVITA (http://www.evita-project.org) being co-funded by the European Commission within the Seventh Framework Programme. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 16 / 16