SECURITY OF CONNECTED THINGS. Dr Alain MERLE Cybersecurity Program Manager



Similar documents
Security testing of hardware product

Security testing for hardware product : the security evaluations practice

PUF Physical Unclonable Functions

Chapter 1: Introduction

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Side Channel Analysis and Embedded Systems Impact and Countermeasures

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Authentication in WLAN

Embedded Java & Secure Element for high security in IoT systems

IoT Security Concerns and Renesas Synergy Solutions

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Certified Cyber Security Analyst VS-1160

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Reviving smart card analysis

IoT Security Platform

Security in ST : From Company to Products

Cisco Trust Anchor Technologies

Microsemi Security Center of Excellence

W ith an estimated 14 billion devices connected to

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Authentication requirement Authentication function MAC Hash function Security of

What is a Smart Card?

CHASE Survey on 6 Most Important Topics in Hardware Security

Single Sign-On Secure Authentication Password Mechanism

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

M-Shield mobile security technology

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Dept. of Financial Information Security

SSL BEST PRACTICES OVERVIEW

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

AMI security considerations

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Client Server Registration Protocol

Gold Lock Desktop White Paper

Information Security Services

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Key Management and Distribution

Cryptography and Network Security

Security in Vehicle Networks

Analyzing the Security Schemes of Various Cloud Storage Services

SPINS: Security Protocols for Sensor Networks

Overview. SSL Cryptography Overview CHAPTER 1

Hardware Security Modules for Protecting Embedded Systems

Problems of Security in Ad Hoc Sensor Network

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Bit Chat: A Peer-to-Peer Instant Messenger

Security and Privacy in Cloud Computing

PrivyLink Cryptographic Key Server *

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

TETRA Security for Poland

A Model-based Methodology for Developing Secure VoIP Systems

Passing PCI Compliance How to Address the Application Security Mandates

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Threat Model for Software Reconfigurable Communications Systems

Security Goals Services

Developing Secure Software in the Age of Advanced Persistent Threats

Bellevue University Cybersecurity Programs & Courses

Triathlon of Lightweight Block Ciphers for the Internet of Things

Jort Kollerie SonicWALL

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

More effective protection for your access control system with end-to-end security

Wireless Networks. Welcome to Wireless

CS549: Cryptography and Network Security

NVM memory: A Critical Design Consideration for IoT Applications

Side Channels: Hardware or Software threat?

Using BroadSAFE TM Technology 07/18/05

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

VPN. Date: 4/15/2004 By: Heena Patel

Strengthen RFID Tags Security Using New Data Structure

e-code Academy Information Security Diploma Training Discerption

Cryptography and Network Security Chapter 14

Lecture VII : Public Key Infrastructure (PKI)

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

CSci 530 Midterm Exam. Fall 2012

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

External Supplier Control Requirements

MySQL Security: Best Practices

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Transcription:

SECURITY OF CONNECTED THINGS Dr Alain MERLE Cybersecurity Program Manager

Source: CISCO, AT&T IOT: SOME FIGURES Cisco predicts 50B of connected object by 2020 Estimated market value $2 trillion by 2020 Up-to 1 trillion sensors deployed Traffic grows by 25% per year 2020 2003 2010 2015 50 billions Humans Connected objects 2

SECURITY: A SOCIETAL CHALLENGE Source: L usine digitale http://www.usine-digitale.fr/article/objets-connectes-les-chiffres-cles-du-marche-francais.n356834 Source: Mobile Ecosystem Forum (MEF) Massive adoption by citizens relies on confidence on security and privacy 3

SECURED COMMUNICATING EMBEDDED SYSTEM Real physical object Embedded hardware and software There is physical access to the object «Telecom» link Often internet connection Use of cryptography Embedded cryptography SECURITY WEAKNESSES? ATTACKS? 4

SYSTEM ARCHITECTURE encryption (confidentiality) signature (integrity) certificate (authentication) acknowledgement (non repudiation) replay attack protection (nonce) DoS protection MitM protection Things Gateway SmartObject Cloud Server Application headless authentication lightweight cryptography wireless communication lightweight security protocol lightweight embedded RNG interoperability service pairing service discovery token verification secure bundle authentication authorization access rights identity management trust & reputation key distribution certificate management authentication user management cryptography security protocol embedded RNG 5 5

ATTACKS TOWARDS THE WIRELESS LINK Relay Independent of the crypto Man on the middle Denial of service Eavesdropping/Skimming NFC characterization Eavesdropping: > 20m Skimming: > 1m 6

Secured by Cryptography Channel is secured. But, if an attacker has a physical access, he can extract the keys 7

ATTACKS ON SECURE DEVICES Cryptanalysis RC5, MIFARE, Mathias Wagner, in 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy proceedings Software of Cosade 2012 attacks Brute force attacks, Etc. Hardware attacks Buffer overflows, Brute force attacks, Attacks on protocols Etc. Extremely powerfull thanks to the direct access to the component: Example: AES-128 key cracking in minutes on a 32-bit unsecure microcontroller 8

HW attacks techniques Imaging / Physical Optical Microscope Electronic microscope X-ray Ultrasonic imaging Observation Power Electromagnetic emission Duration of computation Probing internal signal Light, etc. Fault Injection Under/over powering Over clocking Temperature Electromagnetic Laser, Laser cutting, etc. IP reconstruction, data extraction in ROM, sensors/protections identification, etc. Simple/differential/template /algebraic/horizontal attacks/sca dissassemby, side channel reverse engineering Corrupted execution, differential fault analysis, safeerror attacks, fault injection reverse engineering, etc. 9

PRACTICAL FAULT INJECTION www.arcsis.org 10

PROTOCOLS? Bootstrapping at high-level User device Security manager Resource Consumer Gateway WAN Session establishment Bootstrapping at low-level data source data source LAN How an user to personalize a virgin node into his network? Lowlevel bootstrapping: local credentials (eg. network access) Highlevel bootstrapping: access to the resources (eg. Service) How to have a Secure Update of the SW? How to recover from a compromised situation? How to change the ownership of an object? Source: CATRENE workshop on smartcities 11

COUNTERFEITING Buying a fake branded handbag for your loved one? Finding horse meet in your beef lasagna? Fake portable hard drive? Having easy access to counterfeit medicines? Counterfeiting accounts for 2% of the world trade! Expected to exceed $1.7 trillion by 2015! 12

ALSO IN HARDWARE Fake & genuine Atmel chips Genuine & Fake Toshiba transistors Fake chips sold to US military in 2010 (VisionTech scandal) 13

THE RACE FOR SECURITY All the crypto schemes are based on a secret: Key management Security is complex Needs for specialists in specification, design & validation (evaluation, certification) Theoretical resistance evolves quickly A never ending race between: Developers Evaluation labs Hackers Moore s law of microelectronics DES, TDES, AES, RSA key length, Hash fns Attack techniques Imagination, the only limit? 14

MOORE, MORE THAN MOORE AND The question is not if an attack will come, but when it will come 15

SECURING COMPONENTS Security of sensitive data? Security of programs? Confidence in HW? Caracterisation Secured solutions Unique components Testing Analysing, simulating, (AES, Couplages ) HW root of trust HW + SW countermeasures for cryptoprocessors PUF Specialization of each component Protocol analysis IDS for IOT IoT SW analysis. Run-time protection (SW protections, audits) Secure boot key management. Securing Wireless communication On chip Integrity Checking Off chip. Evaluation / Certification (CESTI) Network integrity 16

A «GOOD» SYSTEM SHOULD PROPOSE «End to End Security» Secured application over an unsecured architecture Safety & Security Safe kernel Availability Adapted keys management «Up to date» security components Certified security kernel Certified SW components Multi-barrier security «Trusted Computing» Integrity checking / On-line audits Evolution capabilities Facing publications or limited life-time Recovery function Ability to move to a safe state after compromising Security should define the architecture of the system and not be added at the end. 17

IN ADDITION No single and perfect solution «Nobody s perfect» Vulnerabilities discovered everyday Secured HW is the best solution but is not perfect Cryptography has also some limits Life time is critical Any error is an attack path Availability is a real challenge for communicating systems Evaluation / Certification is a good tool and should be developed for the IOT. 18

Offre du LETI SENSIBILISATION, PRÉ-ÉTUDE - Guide sur la sécurisation (en préparation) - Préanalyse ANALYSE DE RISQUES encourus en cas d attaque - Risques de sécurité classés par criticité avec des méthodologies d analyse éprouvées (EBIOS, STRIDE ) ANALYSE ARCHITECTURALE - Identification des faiblesses structurelles de l architecture - Confrontation des briques du système à l état de l art des attaques TESTS SÉCURITAIRES - Tests sécuritaires et recherche de vulnérabilité sur les dispositifs et le système - Évaluation en vue d une certification CESTI SOLUTION DE SÉCURITÉ - Intégration de patch correctif de sécurisation - Définition de spécification de bloc de sécurité - Design et intégration de bloc sécurisé (HW/SW) 19

Merci de votre attention