Threat Model for Software Reconfigurable Communications Systems



Similar documents
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Secure Network Communications FIPS Non Proprietary Security Policy

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

Embedded Java & Secure Element for high security in IoT systems

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

M-Shield mobile security technology

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Hardware Security Modules for Protecting Embedded Systems

Innovations in Digital Signature. Rethinking Digital Signatures

Chapter 1: Introduction

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing

IoT Security Platform

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Embedding Trust into Cars Secure Software Delivery and Installation

MovieLabs Specification for Enhanced Content Protection Version 1.0

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

INFORMATION TECHNOLOGY SECURITY STANDARDS

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Lecture VII : Public Key Infrastructure (PKI)

Data Protection: From PKI to Virtualization & Cloud

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Secure web transactions system

IoT Security Concerns and Renesas Synergy Solutions

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

PrivyLink Cryptographic Key Server *

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

ITL BULLETIN FOR AUGUST 2012

USB Portable Storage Device: Security Problem Definition Summary

IBM Crypto Server Management General Information Manual

Pulse Secure, LLC. January 9, 2015

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Chap. 1: Introduction

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Ohio Supercomputer Center

CoSign for 21CFR Part 11 Compliance

Information Security

Safety and security related features in AUTOSAR

Securing Data on Microsoft SQL Server 2012

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Cornerstones of Security

CPSC 467: Cryptography and Computer Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CRYPTOGRAPHY AS A SERVICE

Introduction to Security

Certification Practice Statement

White Paper How Noah Mobile uses Microsoft Azure Core Services

Start building a trusted environment now... (before it s too late) IT Decision Makers

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

User Authentication Guidance for IT Systems

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Patterns for Secure Boot and Secure Storage in Computer Systems

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

CS 356 Lecture 29 Wireless Security. Spring 2013

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

MS-55096: Securing Data on Microsoft SQL Server 2012

How To Protect Your Network From Attack

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

WIND RIVER SECURE ANDROID CAPABILITY

Cloud security architecture

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

EAC Decision on Request for Interpretation (Operating System Configuration)

Cryptography and Network Security

Information Security Program Management Standard

A Framework for Secure and Verifiable Logging in Public Communication Networks

Using BroadSAFE TM Technology 07/18/05

Content Teaching Academy at James Madison University

Why self-signed certificates are much costlier and riskier than working with a trusted security vendor

CipherShare Features and Benefits

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Best Practices for Outdoor Wireless Security

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

The Security Framework 4.1 Programming and Design

Key Management Best Practices

05.0 Application Development

Trusted Platforms for Homeland Security

FIPS Security Policy LogRhythm Log Manager

A Draft Framework for Designing Cryptographic Key Management Systems

Securing Distribution Automation

Transcription:

Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group

Overview Overview of the SDR Forum SDR Forum High Level Security Requirements Vision for Attribute Authentication Threat Model (work in progress) Assets Threats Countermeasures Mechanisms 2

Overview of the SDR Forum

Mission Overview of the SDR Forum Accelerate the development and proliferation of SDR and cognitive radio technologies to support the needs of all user domains and stakeholders Vision Ubiquitous wireless communications Membership The SDR Forum is a non-profit organization comprised of decision makers, planners, policy makers and program/product managers from a broad range of organizations 4

SDR Forum Organization Board of Directors Executive Director CTO (vacant) Technical Committee Regulatory Committee Markets Committee Cognitive Radio Processes &Tools R&D Smart Antenna Systems Interface Commercial SDR Security Education Space SCA Standards Management API Interface Test and Evaluation Public Safety Avionics Cognitive Applications 5

SDR Forum High Level Security Requirements 6

High-level Security Requirements Overview Documented in the SDR Forum publication High Level SDR Security Requirements (SDRF- 06-A-0002-V0.00, January 2006) High-level Detailed functional requirements are in development Universal Intended for all radio market segments, not public safety in particular SDR reconfigurability demands a universal approach SDR Security Address SDR risks, not general communications risks Requirements List 1. Policy-driven behavior 2. Stakeholder-driven Policy 3. Device attestation 4. Protected download 5. Policy-compliant installation and instantiation 6. Run-time control 7. Resource integrity 8. Access control 9. Audit 10.Process separation 11.Implementation assurance 12.Supportive operations 7

Requirements ive: Mitigate Risk Bad software can: Adversely impact radio performance, reliability, and availability Cause radio interference Potentially generate unintended harmful electromagnetic radiation Unauthorized Modification of Hardware versus Software Radio Hardware Radio Modify one device at a time Requires some radio expertise Requires physical access to the device Software Radio Modify large numbers of devices nearly simultaneously No special expertise required (for software download or update) Can occur over significant distances using any frequency that the SDR is capable of receiving 8

Requirement #1: Policy Driven Behavior An SDR device SHALL enforce a device-specific SDR security policy that governs the behavior of the device at all times. Potential Areas of Standardization: Policy language Trusted boot process Spectrum System Integrity at Rest Integrity in Transit Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 9

Potential Types of Policy and Their ives 1. Spectrum Access Policy: Limit functionality to user requirements Software Radio Functionality Hardware Radio Functionality Policy Defined Functionality To prevent an accidental or malicious use of additional software functionality, radio is limited by policy 2. Attribute Policy: Authenticate list of required attributes (e.g., s/w origin, security certification, platform compatibility) 10

Requirement #2: Stakeholder Driven Policy The SDR device SHALL ensure that its device-specific SDR security policy incorporates the SDR security policies of its stakeholders within the scope of their authority. Potential Areas of Standardization: Policy language Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 11

Potential Stakeholders Manufacturer Assembler Component manufacturer Software Developer Network Operator Regulator Owner Others 12

Requirement #3: Attestation An SDR device SHALL provide trusted configuration information to the device s radio communications service providers and other authorized entities on demand. Potential Areas of Standardization: Attestation protocol Spectrum System Oject Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 13

Requirement #4: Protected Download An SDR device SHALL provide confidentiality services for download of SDR-related software and configuration data as determined by the device s SDR security policy. Potential Areas of Standardization: Download protocol Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 14

Requirement #5: Policy-compliant installation and instantiation An SDR device SHALL only install and instantiate SDR-related software and policy that have been appropriately certified to be compliant with the device s SDR security policy. Potential Areas of Standardization: Most likely left to vendor implementation Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 15

Requirement #6: Run-time control An SDR device SHALL at run-time prevent transmissions that violate its SDR security policy. Potential Areas of Standardization: Policy language Radio transmission interface Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 16

Requirement #7: Resource integrity An SDR device SHALL detect the unauthorized modification of its SDRrelated resources and take actions determined by the SDR security policy. Potential Areas of Standardization: Most likely left to vendor implementation Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 17

Requirement #8: Access control SDR devices SHALL control access to each SDR-related resource on the device. Potential Areas of Standardization: Most likely left to vendor implementation Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 18

Requirement #9: Audit An SDR device SHALL detect security relevant events and notify specified processes as determined by the SDR security policy. Potential Areas of Standardization: Audit record content and format SDR SNMP MIB and traps Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 19

Requirement #10: Process separation An SDR device SHALL have mechanisms to prevent SDR-related applications from compromising the security of non-sdr-related applications and data. Potential Areas of Standardization: Separation methods Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 20

Requirement #11: Implementation assurance Information assurance mechanisms that support enforcement of the SDR security policy SHALL be validated against industryrecognized evaluation standards. Potential Areas of Standardization: Evaluation of cryptographic methods Certification of SDR policy enforcement mechanisms Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 21

Requirement #12: Supportive operations Operational practices supporting information assurance mechanisms SHALL be consistent with and supportive of the SDR security policy. Potential Areas of Standardization: Processes (e.g., key insertion for root of trust) Software development assurance (e.g., DO 178B) Spectrum System Integrity Integrity Protection of Non-SDR Resources #Primary control #Secondary control #Minimal protection provided / NA 22

Requirement Mapping Requirements to ives Spectrum System Integrity Integrity Protection of Non-SDR Resources Policy Driven Behavior Stakeholder Driven Policy Attestation Protected Download Policy Compliant I&I Run-time Control Resource Integrity Access Control Audit Process Separation Implementation Assurance Supportive Operations 23

Attribute Authentication 24

Attribute Authentication Principles Stakeholders state required attributes of objects Attributes are open-ended; defined by stakeholders A platform s object attribute policy (OAP) is the conjunction of stakeholder contributions Developers/distributors of objects or their agents make attribute claims Claimants generate digital signatures on objects for each claim to provide: Binding of claim to object (assurance of integrity) Non-repudiation of the claimant s identity Radio platforms verify digital signatures (claims) Assurance of truth of claim is provided through out-ofband process 25

Examples of Attribute Policy (OAP) Simple OAP example Stakeholder Claimant Attribute Claim Authentication Method Acme Radio (manufacturer) Acme Radio This radio software functions properly on radio model 123 RSA 1024 Extended OAP policy example Stakeholder Claimant Attribute Claim Authentication Method FCC (regulator) Acme Radio This radio software operates in compliance with FCC Part 15 rules ECC 163 Acme Radio (manufacturer) Easy-link Software Easy-link wrote this software and is liable for performance failures RSA 2048 DHS (owner) NIST Crypto modules are validated against FIPS 140-2 RSA 1024 DHS (owner) Conformance Testing Laboratory This software running on Acme Radio model 123 has passed interoperability tests specified in TIA TSB-102.CABA ECC 224 26

OAP = Conjunction of Policy Contributions Regulator Contribution Manufacturer statement of Part 15 Compliance OAP Manufacturer statement of Part 15 Compliance Manufacturer Contribution Easy-link liability assignment Easy-link liability assignment Owner Contribution NIST validated crypto TIA interoperability certification NIST validated crypto TIA interoperability certification Note: Each Contribution and OAP can be implemented as an array of public key certificates 27

Attribute Authentication Transaction OAP Manufacturer statement of Part 15 Compliance Easy-link liability assignment NIST validated crypto TIA interoperability certification Should this object be instantiated? No. Easy-link made claim for wrong attribute Missing claim for NIST validated crypto Header Acme: Part 15 Compliant Easy-link: Developed code TIA: Interoperability certification Data signatures (claims) 28

High-Level Security Architecture for Reconfigurable Radio Communications v0.09 Radio Domain(s) Software Policy Domain Crypto Domain Untrusted Domain (s) (e.g., consumer OS/applications ) Communications Software and Applications Radio Transmission Filter Policy Service Download and Reconfiguration Service Cryptographic Services Untrusted Application (s) Untrusted Communications Protocols Isolation Layer Radio Hardware Front End(s) Hardware Resources Legend Security Domain Boundary Optional Domain Boundary Universally-defined interface = Reconfigurable Radio Resource = Other Resources Within Scope of Reconfigurable Communications Policy = Out of Scope of Reconfigurable Communications Policy = Hardware 29

Digital Signature-based Verification Today 3GPP Mobile Execution Environment (MExE) Symbian Signed program Microsoft Windows Mobile OS and.net framework Java JSR118 Mobile Information Device Profile (MIDP) 2.0 30

What s New About SDR Forum Approach Multiple signatures To date, most authenticated code systems rely on one signature Stakeholder contributions To date, most systems involve single stakeholder Claimant/Claim framework Today, signatures primarily only used for object origin and in some cases certification 31

SDR Threat Model (work in progress) 32

Threat Model Overview Model Layer Primary Assets Supporting Assets Threats Countermeasures Mechanisms Example Electromagnetic Spectrum Radio Software Unauthorized Modification Integrity Services Hash value in digital signature 33

Primary Assets Electromagnetic Spectrum Health and Safety Communications Service Intellectual Property User Applications and Data Reputation 34

Supporting Assets Radio Software Operating Environment Operating System Software Device Drivers Memory 35

Threats Unauthorized Modification Unauthorized Reading } In transit In storage While Executing Masquarade/Impersonation Of user/organizational entity Of device/infrastructure Software Misuse Rogue Software 36

Countermeasures Integrity Services Services Authentication Services Entity Device Attribute Access Control Physical (to the device) Computing Environment Spectrum } In transit In storage While executing 37

Countermeasures Integrity Services Services Authentication Computing Resource Access Control Spectrum Access Control 38

- Human health - Ordinance -Fuel - Medical materials - Spectrum owner: revenue - User: communications content - Service provider: revenue - Enforceable intellectual property rights - Unenforceable trade secrets - Operating system/environment - Protocols/drivers - Cryptographic secrets - Situational awareness Primary Assets Health and Safety Electromagnetic Spectrum Communications Service Intellectual Property Reputation User Data Supporting Assets Consequences Threats Software Misuse Unauthorised Reading of Software in Transit Radio Software Unauthorised Modification of Software Replay of Software Unauthorised Reading of Software in Storage Unauthorised Modification of Software in Storage Unauthorised Reading of Software while Executing User Applications and Data Unauthorised Modification of Software while Executing Sample consequences Revelation of trade secrets Illegal copying Activation of a non-desired service Breaking of service commitment Denial/Degradation of Service Inoperable device Violation of spectrum access rules Increased power output Execution of older buggy software version Violation of user privacy Enabling Threats Masquarade/ Impersonation of Device Masquarade/ Impersonation/ Cloning of Software Provider Countermeasures Spectrum Access Control of Software in Transit Integrity of Software in Transit Replay Protection Device Authentication Software Origin Authentication Entity Authentication Secure Storage Integrity of, of and Controlled Access to Stored Software and Data Process Separation Potential Mechanisms Spectrum Policy Control Asymmetric Encryption MACing Timestamps Platform Attestation Unilateral Authentication Protocol Sealing Software-based Isolation Software-based Isolation with Hardware Support Hardware isolation Symmetric Encryption Digital Signatures Nonces Secure Boot Process Supporting Mechanisms Authenticated Boot Process Recommended Universal Mechanisms Spectrum Policy Control Cryptographic Functionality Security Policy Management Trusted Computing Technologies 39

Summary The SDR Forum has published high-level SDR security requirements A major component of the security framework is code signing using public key cryptography Current work: Understanding threat profile under which controls are desirable Developing compete set of mechanisms 40