Gerard Fianen. Copyright 2014 Cypherbridge Systems LLC info@cypherbridge.com. Page 1



Similar documents
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Chapter 7 Transport-Level Security

Virtual Private Networks

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security Part II: Standards

Quick Start Guide. USB Packet Sniffer/Dongle for Kinetis MKW22D and MKW24D Wireless MCUs USB-KW24D512

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Securing IP Networks with Implementation of IPv6

How To Understand And Understand The Security Of A Key Infrastructure

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Lecture 17 - Network Security

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

VPN. VPN For BIPAC 741/743GE

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Network Security Essentials Chapter 5

Secure, Efficient, and Open Standard Internet of Things

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Network Access Security. Lesson 10

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

W ith an estimated 14 billion devices connected to

Using IPSec in Windows 2000 and XP, Part 2

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Implementing and Managing Security for Network Communications

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Chapter 17. Transport-Level Security

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

How To Industrial Networking

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

CCNA Security 1.1 Instructional Resource

Computer Networks. Secure Systems

CS 4803 Computer and Network Security

Application Note: Onsight Device VPN Configuration V1.1

Understanding the Cisco VPN Client

Network Management Card Security Implementation

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Gigabit Multi-Homing VPN Security Router

Laboratory Exercises V: IP Security Protocol (IPSec)

The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015

SSL SSL VPN

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Lab a Configure Remote Access Using Cisco Easy VPN

Chapter 32 Internet Security

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

IP Security. Ola Flygt Växjö University, Sweden

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Configuring Security Features of Session Recording

GNAT Box VPN and VPN Client

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

System-on-a-Chip with Security Modules for Network Home Electric Appliances

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security. Lecture 3

Exam Questions SY0-401

Firewalls, Tunnels, and Network Intrusion Detection

Configuring a VPN between a Sidewinder G2 and a NetScreen

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

vcloud Director User's Guide

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Overview. SSL Cryptography Overview CHAPTER 1

Microsoft Azure Configuration

Windows XP VPN Client Example

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Security Engineering Part III Network Security. Security Protocols (II): IPsec

ipad in Business Security

z/os Firewall Technology Overview

SSL Handshake Analysis

Administrator's Guide

Introduction to Computer Security

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

SonicOS Enhanced Release Notes

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Joe Davies Principal Writer Windows Server Documentation

Table of Contents. Cisco Cisco VPN Client FAQ

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

CenturyLink Cloud Configuration

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

LPC2300/LPC2400 TCP/IP Overview. TCP/IP and LPC2300/LPC2400 Family October 2007

Computer and Network Security Exercise no. 4

[SMO-SFO-ICO-PE-046-GU-

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

IINS Implementing Cisco Network Security 3.0 (IINS)

McAfee Firewall Enterprise 8.2.1

Chapter 8 Virtual Private Networking

Transcription:

Securing the Internet of Things Gerard Fianen Copyright 2014 Cypherbridge Systems LLC info@cypherbridge.com Page 1

INDES-IDS BV - Embedded Software Development The choice of professionals info@indes.com www.indes.com/embedded Tel: 0345-545.535

IoT- Growing Pains Hacking in embedded control systems is increasing risk Securing Personally Identifiable Information (PII) is crucial for the rollout and growth of IoT market Regional or National Regulatory requirements such as HIPPA require electronic data privacylayers to protect personal information, and to verify data integrity and authenticity Removable flash drives make it easy to install and steal programs or data Copyright 2014 Cypherbridge Systems LLC Page 3

Security Protocols and libraries ussl/tls point to point secure channel above TCP layer. Use this for perapplication secure client or server. Flexible protocol for embedded TLS HTTPS, SMTPs, DTLS UDP, etc. Supports secure file transfer by FTPS. ussh Secure telnet replacement. Supports secure file transfer by SCP uvpn point to point secure channel at IP layer. Bulk encryption for all traffic between endpoints. Use for road warrior or fixed infrastructure connection. ufile Add encrypted file system to protect stored data on embedded system ucrypt general purpose crypto library including high-strength cipher & hash Copyright 2014 Cypherbridge Systems LLC Page 4

SSL and SSH Host Application (modified for SSL) SSH Client CypherBridge SSL TCP/IP stack Link Layer Secure SSH Connection Target SSH Server SSL, TLS 1.0, 1.1 and 1.2, PKI X.509 certificates, crypto, hashing and network protocols. SSH and secure TCP/IP tunnel embedded server and client, flexible interactive shell, and SCP copy option.

IPSEC Standard IP-protocol not secure IPsec wil add Encryption Authentication TCP/IP Application (unmodified) TCP/IP Stack Cypher- Bridge IKE CypherBridge IPsec Link Layer Supports AH and ESP connections Integrated ucrypt cryptographic library includes DHM, AES, 3DES, RC4, SHA1, MD5 TCP/IP StacK NetIF interface integrates with RTOS, Kernel, User Mode TCP/IP stacks Network

IKE -an application which generates keys and distributes them securely Security Associations are stored in SA database (SADB), used by IPsec Security Policy Database (SPD) governs what security to apply to incoming and outgoing packets SPD SADB IKE Appl TCP/IP stack IPsec SAs can be setup in advance no negotiation overhead when applications need secure communication Appl IKE SPD TCP/IP stack IPsec SADB

IPSEC/ IKE

VPN

Case Study - Malware Install Payment system hacks in large scale retail systems including Target, Home Depot, and others requires new levels of control for software updates System is first compromised by hacking into back office systems Once hackers get command line, then malware installs from IT systems are downloaded to terminals through software update process Terminals fail to authenticate software update Malware becomes resident in terminal and works with compromised back office system to steal payment card track information and PINs Copyright 2014 Cypherbridge Systems LLC Page 10

uload Install Defender Overview LKG and factory image rollback Managed registry retains image history Power fail recovery Manage code images and FPGA bitstream files Use standard compilers including IAR, GCC, Keil etc. Example porting : NXP LCP1857 (Cortex-M3) Copyright 2014 Cypherbridge Systems LLC Page 11

uload Install Defender Overview Resident loader in embedded terminal Authenticate safe origin and integrity of software updates Software is installed only if genuine and authorized Multi-level encryption and hashing achieves robust solution Encrypted files on USB or MicroSDflash drives are un-hackable if lost or stolen Copyright 2014 Cypherbridge Systems LLC Page 12

Prepare Software Update File using WinSDS GUI or ufile command line Toolkit: WinSDSGUI imports compiled and linked binary image from standard toolchain E.g. IAR, GCC etc, etc. User enters activation code Encrypts image and adds managed file header Managed file is safe and ready to install! Copyright 2014 Cypherbridge Systems LLC Page 13

uloadinstall Defender Step-by-Step Loader starts at reset, armed with pushbutton hold-down, reads loader.ini options and file names from USB or MicroSDflash drive Loader verifies external system application file integrity using managed image header and keyset Loader verifies internal application against managed image files. Must exact match SHA1 hash. If verify fails, loader reads application file from USB and writes to MCU internal flash. Loader jumps to system application start address Loader failsafe jumps to system application if any load steps fail Copyright 2014 Cypherbridge Systems LLC Page 14

Loader Start USB Example Reset Device Manager start USB MSC File System No USB Ready? Yes Read loader options file loader.ini Loader.ini Sysapp.uld Keyset.txt Use compiled default loader options Loader Finish No Use defaults INI Read OK? Yes Loader Install Copyright 2014 Cypherbridge Systems LLC Page 15

Loader Installs System Application No Load keyset Verify system application file File Verified? Yes Sysapp.uld Keyset.txt Recovery Enabled? No Compare application internal flash against application file Yes Go to Install Recovery Application Yes Match? No Install system application file to internal flash Loader Finish Copyright 2014 Cypherbridge Systems LLC Page 16

Loader Finish Device Manager close file system Yes Failsafe Check? No No Failsafe Enabled? No Install OK? Yes Yes Prompt Operator for Recovery Restart Loader Jump to System Application Copyright 2014 Cypherbridge Systems LLC Page 17

Nice.. But how do I add this to my embedded system? Can t I simply download this all from the internet? Embedded systems can be very resource constrained Memory footprint Performance Power Budget Integration in my embedded application Drivers & RTOS integration? Integration with IP-stack Integration with application code Is all this not very complex? I am in a hurry to get to market!! Copyright 2014 Cypherbridge Systems LLC Page 18

Integration & porting examples : TexasInstrumentsMSP430, StellarisCortex M3, SitaraCA8 and ARM9. DSP BIOS/NDK platforms includingdm642 NXP3250 ARM9, LPC175x, LPC1768, LPC1788, LPC18x57 ST Microelectronics STM32F2xx and STM32F4xx Freescale KinetisK60 Renesas M16C, RX62N Atmel AT91SAM ADI Blackfin Evaluationboards fromfreescale, STMicroEvaland Discovery, TI, NXP, Phytec, Keil, Atmel, Embedded Artists, Critical Link, and more! Copyright 2014 Cypherbridge Systems LLC Page 19

Copyright 2014 Cypherbridge Systems LLC Page 20

Integration & time-to-market : - SDK s and Toolkits uload Safe software loader and installer blocks malware & unlicensed updates CDK Cloud Toolkit integrated end-to-end solution to enable devices to connect securely to the cloud, to synchronize and replicate files Copyright 2014 Cypherbridge Systems LLC Page 21

Integration & time-to-market : - Vertical Solution packages and customer examples Electric Vehicle Charging Solution usslsdk, Control firmware & TCP-stack on Renesas M16C65 Smart Meter Security ussl SDK, Embedded RTOS & TCP-stack on STM32F207 Scada Secure Telemetry usshsdk, Embedded RTOS and TCP on STM32F407 AK200 Point-Of-Sale Terminal Platform provides a low-power, low-footprint approach to wirelessly secure payment transactions in embedded devices. AK200 includes a nationwide cellular data plan in partnership with WylessGroup, an M2M managed service provider. Copyright 2014 Cypherbridge Systems LLC Page 22

INDES-IDS BV - QuickStart service On-site assistance in setting up Tools, RTOS and middleware We can do the integration with your platform and application for you Local expert support You give us (prototype) hardware so we can locally reproduce problems and support you Fixed price integration services Copyright 2014 Cypherbridge Systems LLC Page 23

For more information contact: sales@indes.com Tel : 0345 545.535 www.indes.com/embedded Page 24