cross-domain security of cyber- physical systems · tools tool path generation printer firmware...

32
Cross-Domain Security of Cyber- Physical Systems Sujit Chhetri, Jiang Wan, Mohammad Al Faruque

Upload: others

Post on 02-Oct-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Cross-Domain Security of Cyber-

Physical Systems

Sujit Chhetri, Jiang Wan, Mohammad Al Faruque

Page 2: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Courtesy: Professor Edward Lee

Cyber-Physical Systems

Page 3: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Kinetic Cyber Attacks

Kinetic Cyber a class of cyber attacks that can cause direct or indirect

physical damage, injury or deathsolely though the exploitation of

vulnerable information systems and processes.

Source: Scott D. Applegate, Lieutenant Colonel, United States Army, “The Dawn of Kinetic Cyber” https://www.wired.com

https://www.wired.com

Page 4: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Cyber-Physical Systems Security

Side-Channel Attacks attack based on information gained from the

physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms

timing information, power consumption, electromagnetic leaks or even sound can be exploited to break

the system. Source: Wikipedia

Page 5: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Outline

Overview

Physical-to-Cyber-Attack – Side-Channel

Attack

Cyber-to-Physical-Attack – Kinetic Cyber

Attack

Page 6: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Acoustic Side-Channel Attacks

on Additive Manufacturing

T h i s w o r k i s p a r t i a l l y s u p p o r t e d b y N S F C P S g r a n t C N S - 1 5 4 6 9 9 3 !

Published in International Conference on Cyber Physical System 2016 (ICCPS)

Page 7: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Growth

Airbus 350

o 1,000 3D Printed Parts

Automotive

o BMW, GE, Mazda, Honda

$21B industry by 2020!

Additive Manufacturing (3D Printer)

Source: http://www.bbc.com/

Source: http://helicecluster.com/

Source: http://www.materialsforengineering.co.uk/

Wholers

Source: https://dupress.deloitte.comGraphics: Deloitte University Press | DUPress.com

Electronics: SLS

Interior & Seating:SLS

Wheel, tires & Suspension: SLS, Inkjet, SLM

OEM: SLM, Electronic BeamFrame: SLMEngine:

Electron Beam

Gartner: $100 Billion Losses Per Year in IP by 2018 due to 3D Printing!

Page 8: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Intellectual Property (IP)

Unique Features

IP in Additive Manufacturing [1]

o Geometric Shape,

o Process Information,

o Machine Information,

o Stored in Cyber Domain!

[1] M. Yampolskiy et al., “Intellectual property protection in additive layer manufacturing: Requirements for secureoutsourcing," in Proceedings of the 4th Program Protection and Reverse Engineering Workshop, p. 7, ACM, 2014.

Source: http://thegreatfredini.com/

Source: http://cartype.com/

Source: http://amolife.com/

Page 9: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Our Contribution

Acoustic Leakage Analysis

o Fused Deposition Modeling

(FDM) based 3D Printers

Novel Acoustic Attack Model

o To breach confidentiality

Source: https://pixabay.com

IP

Page 10: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Background - Digital Process Chain

3D modelDesign

CAD Tool STL filesSlicingTools

LayerDescription files

PrinterFirmware

PrintingProcess

Cyberdomain

Physicaldomain

CAM design processCAD design process

Manufacturingprocess

Page 11: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Digital Process Chain (G-code)

G-code Structure

o Travel Feed rate

o Movement Axis

o Extrusion Amount

Sliced using Slicr

Page 12: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Attack Model

AcousticData

Acquisition

TrainingModel

Target Machine

Side Channel(Medium)

G-codeReconstruction

Attacker

Action

IP TheftResult

ToolLearning Algorithm

Page 13: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Attack Pipeline

Pre-

processingData

Acquisition

3D Printer

Feature

Extraction

G-code

Mapping

Regression

Model

Classification

Model

SpeedAxis

Information

Post-

Processing

G-code

ReconstructionModel

Recreation

Training Phase Testing Phase

Distance

Training

G-code

Training

G-code

Page 14: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Experimental Setup

3D Printer

PrintrbotZoom H6

Audio-

Recorder

PLA

Thermoplastic

Cura 15.04 Printer Software

X

Y

Z

Page 15: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Classification Models Training Performance

Single Axis Motions can be Classified Easily!

Page 16: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Regression Model

Training Performance

4500

3500

2500

1500

500500 1500 2500 3500 4500

Real Speed (mm/min)

Pre

dic

ted

Sp

eed

(m

m/m

in)

i) Motion in just X Axis ii) Motion in just Y Axis

4500

3500

2500

1500

500500 1500 2500 3500 4500

Real Speed (mm/min)Pre

dic

ted

Sp

eed

(m

m/m

in)

High Linearity Between Real and Predicted

Speed

Outliers

Outliers4500

3500

2500

1500

500500 1500 2500 3500 4500

Real Speed (mm/min)

Pre

dic

ted

Sp

eed

(m

m/m

in)

i) Motion in just X Axis ii) Motion in just Y Axis

4500

3500

2500

1500

500500 1500 2500 3500 4500

Real Speed (mm/min)Pre

dic

ted

Sp

eed

(m

m/m

in)

High Linearity Between Real and Predicted

Speed

Outliers

Outliers

High Predication Accuracy for X axis Movement!

Page 17: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Test Parameter and Test Objects

Speed 900 mm/min

20 mm

20

mm

Original model

Before Post Processing

19 mm

19 m

m

After Post Processing

Original Model

20 mm

20

mm

20 mmSpeed 900 mm/min Before Post Processing After Post Processing

Speedo 900 to 1700

mm/min

Dimensiono 5 mm to 20 mm

Complexityo Multiple Axis

Average Axis Prediction Accuracy: 78.35%

Average Length Prediction Error: 17.82%

Higher Accuracy for Slower Speed and Larger Dimension!

Page 18: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

o CPS Security - physical-to-cyber

First acoustic attack model for 3D printing

New compilation technique to reduce leakage –Slicing algorithm DATE 2017

On-Going work: Manufacturing process quality control

Summary of Physical-to-Cyber-Attack

Page 19: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Outline

Overview

Physical-to-Cyber-Attack – Side-Channel

Attack

Cyber-to-Physical-Attack – Kinetic Cyber

Attack

Page 20: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Kinetic Attacks on Additive Manufacturing

Physical domain

3D Printer

CAD Tool

STL files

SlicingTools

Tool Path Generation

PrinterFirmware

Cyber domain CAM design processCAD design process

G/M-code3D Design

Cyber Attacks

Physical Effects:Damage to Product, Machine,

and Human Life!

Digital Process Chain

Page 21: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Kinetic Attacks on Additive Manufacturing

Zero-Day Kinetic-Cyber Attacks

o Void Placement in STL Virginia Tech

o D638-10 Tensile Specimen[1]

o Load Handling Capacity 14%

[1] American Society for Testing and Materials (ASTM) Standard

Can Affect

o Aerospace, automotive!

Source: https://i.ytimg.com/vi/1CPy6dLCVJ8/maxresdefault.jpg/

3D Printer as Weapon

o Attack taxonomy (3D objects, 3D Printer,

environment) University of South Alabama

Page 22: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Attack Example

Code Injection into plastic

propeller: Damage $1000 [2 ]-

Ben-Gurion University of the

Negev (BGU), University of South

Alabama

[2] https://techcrunch.com/2016/10/21/researchers-sabotage-3d-printer-files-to-destroy-a-drone/

Page 23: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Our Contribution

Modeling of an Adversary

o Define various attack points

Data-Driven Modeling of the System

o Statistical estimation

Analysis of Analog Emission

o Using mutual information

Page 24: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Adversary Model

Capability of the Attacker

o Modify CAD tools, CAM tools

o Intercept the network

o Modify the firmware

3DModelDesign

Attackers

CADTool

STL

u

A1

G/M-code

A2

CAM Tool

A3

AM MachineFirmware

Hardware

Original Control

Signal (y)ỹ

Page 25: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Adversary Model

Effects of the Attack

o Cyber-attack introduces variation in the

information flow (u).

o Changes Control Signals y to ỹ in physical domain.

CADTool

G/M-codeSTLAM MachineFirmware

Hardware

Original Control

Signal (y)

u

A1 A2

ỹA3

Attackers

CAM Tool

3D ModelDesign

Altered Design!!

Page 26: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

KCAD Method

o High Mutual Information between control

signals (y) and Energy Flow (acoustic, power,

magnetic, thermal, etc.)

STLSlicing/

Tool Path Algorithm

G-code/M-code

Interpreter

AM Machine

Analog Emission Sensors

Detection Model

Slicing/

Algorithm

G-code/M-code

KCADAM Process Chain

Pre-processing

and Feature Extraction

Tool Path

Page 27: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

KCAD Method: Simplified!

0100

10

1/10/1

1/0

Cyber Domain

3D Printer FirmwareTraining G/M-code

Cyber Domain

CPS Designer

Cyber Domain

Attacked Firmware

0100

11

1/10/1

0/1

Attacker

Detection Model

Training Observed

AnalogEmissions

Attack Detection

Operational Observed

AnalogEmissions

Page 28: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

KCAD Method:

Cyber Domain

Attacked Firmware

0100

11

1/10/1

0/1

Attacker

o Introduces minutes changes which are hard

to inspect without special equipment.

o Speed, distance, axis movement, etc.

o Affects the structural integrity of the 3D objects.

Page 29: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Test Results

False Positive Rate

True Positive Rate

0.1974

0.2812

0.3402

0.7968

0.8663

0.7787

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

Rate

Speed

Dista

nce

Axis

True Positive Rate= TP/(TP+TN)

Accuracy= (TP+TN)/Total Sample

Accuracy for Detection

Speed = 72.83%

Distance = 79.25%

Axis = 79.07%

Average = 77.45%

Page 30: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Test Case: Base Plate of QuadCopter

a) Original G-code Trace.

b) G-code Trace after Kinetic Attack.

Minute

Modificat ion

(4 mm)

Page 31: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Summary

o Monitor Information Flow from any point in

Digital Process Chain

o Detect any modifications that affect Dynamics

o Detection during printing stage

o Non-intrusive and hence supports Legacy

Systems!

Page 32: Cross-Domain Security of Cyber- Physical Systems · Tools Tool Path Generation Printer Firmware Cyber domain CAD design process CAM design process G/M-code 3D Design Cyber Attacks

Questions

Thank You!

Cross-Domain Security of Cyber-Physical Systems