security for connected objects · | 2 • cisco predicts 50b of connected object by 2020 •...

25
SECURITY FOR CONNECTED OBJECTS Alain MERLE CEA-LETI [email protected]

Upload: others

Post on 25-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

SECURITY FOR CONNECTED

OBJECTS

Alain MERLE

CEA-LETI

[email protected]

Page 2: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 2

• Cisco predicts 50B of connected object by 2020

• X-as-a-service

a breakthrough for carrier’s business according to Ericsson

• Estimated market value $2 trillion by 2020

• Up-to 1 trillion sensors deployed

• Traffic grows by 25% per year

• What about security?

IOT: SOME FIGURES

Connected objectsHumans

2003

2010

2015

2020

50 billions

Sourc

e:

CIS

CO

, A

T&

T

Page 3: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 3

SECURED COMMUNICATING EMBEDDED SYSTEM

Real physical object

Embedded hardware and software

There is physical access to the object

« Telecom » link

Often internet connection

Use of cryptography

Embedded cryptography

SECURITY WEAKNESSES ? ATTACKS ?

Page 4: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 4

• Today security / privacy issues make the newspaper headlines

IOT: THE INTERNET OF THREATS

Page 5: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 5

FOR E-HEALTH

Page 6: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 6

• Source:

http://www.dagbladet.no/2013/12/16/nyheter/nullctrl/shodan/english/en

glish_versions/30861347/

Journalism in Dagbladet (Norway), European Press Prize 2013

Search engine: SHODAN

• 2048 Cameras, 1781 Printers, 2500 Control systems

Unprotected, « Open » access

NULL CTRL

Page 7: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 7

• TV magazine on June 5th, 2014

Antenne2, « Envoyé spécial »

PRIVACY ?

Page 8: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 8

Selling

Company

What do you expect.

Reality

Risk

Page 9: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 9

PRIVACY

“We do not exclude to sell the

personal data … anonymized”

Already sold in USA, non

anonymized (bonus for insurance if

loosing weight)

There is also an interest (societal,

economy, health) in statistics on

datasets

Page 10: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 10

COUNTERFEITING

Finding horse meet in

your beef lasagna?

Buying a fake branded handbag

for your loved one?

Having easy access to

counterfeit medicines?Fake portable

hard drive?

Counterfeiting accounts for 2% of the world trade!

Expected to exceed $1.7 trillion by 2015!

Page 11: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 11

ALSO IN HARDWARE

Fake & genuine Atmel chips

Genuine & Fake Toshiba transistors Fake chips sold to US military in 2010

(VisionTech scandal)

Page 12: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 12

• Relay

Independent of the crypto

• Man on the middle

• Denial of service

• Eavesdropping/Skimming

ATTACKS TOWARDS THE WIRELESS LINK

NFC characterization

Eavesdropping: > 20m

Skimming: > 1m

Page 13: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 13

ATTACKS ON SECURE DEVICES

Hardware attacks

Cryptanalysis Software attacks

Extremely powerfullthanks to the direct access to the component:

Buffer overflows,

Brute force attacks,

Attacks on protocols

Etc.

RC5,

MIFARE,

Brute force attacks,

Etc.

Example:AES-128 key cracking in minutes on a 32-bit unsecure microcontroller

Page 14: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 14

SIDE CHANNEL ANALYSIS (SCA, DPA)

EM

KM C

0110010101100001 010110000110011

Vcc

gndCurrent consumption

measurement

The power consumption of a chip depends on

• the manipulated data

• the executed instruction

Page 15: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 15

ELECTROMAGNETIC LEAKAGE

CPU

EEPROM

EEPROM

ROM

ROM

RAM

CRYPTO

Probe

4.5 mm

5.5

mm

Page 16: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 16

Altering the

chip’s functioning

Security

Weakness

Voluntary modification

of a chip’s environment

Vcc

0Voltage Glitch

FAULT ATTACKS

Example: DFA

Page 17: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 17

PRACTICAL FAULT INJECTION

www.arcsis.org

Page 18: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 18

INVASIVE ATTACKS

Delayering

Deposit probe pads on a bus or through conductive grid

Connect tracks

Cut tracks

Remove the top layers Read the content of the array

0 0 0 1 1 1 1 1WL

Page 19: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 19

Constant Race between ‘hackers’ and ‘security

designers’

New attacks / New tools /

Better computing power…

The security of a system is determined by the security of its weakest link

Very fast evolving area: Take care of the life time

SECURITY PARADIGM

Page 20: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 20

• How an user to personalize a virgin node into his network?

Lowlevel bootstrapping: local credentials (eg. network access)

Highlevel bootstrapping: access to the resources (eg. Service)

Directions

• In-band pairing

• Out-band pairing

• Secure storage

• Preshared certificates

• How to have a Secure Update of the SW ?

• How to recover from a compromised situation ?

BOOTSTRAPPING, DEPLOYMENT, UPDATE, RECOVERY

Securitymanager

User device

Resource Consumer

data source

Sessionestablishment

data source

LAN

WAN

Bootstrappingat “low-level”

Bootstrapping at “high-level”

Gateway

Source: CATRENE workshop on smartcities

Page 21: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 21

EMBEDDED SYSTEMS

Source: Attacks on Mobile and Embedded Systems – Five important trends, June 20, 2011, Mocana Corporation https://www.mocana.com/

Lack of security can cause loss of reputation, loss of revenue, and even

liability claims.

Need to be protected

Page 22: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 22

• Unique identifier (key) for each

object

PUF, Secure element, PKI

• Secured implementation of

adapted cryptography

Lightweight, Homomorphic,

functional, etc

• Generalized integrity checking

(HW, SW)

• Adapted protocols

• And some others ….

SOLUTIONS ?

Tamper resistant chip design

Source: VERAYO

Page 23: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 23

• Cryptography (AES 128) is not all the solution

Security of the implementation

Protocols (bootstrapping, Update, Recovery)

• There are no quick fixes : « Nobody is perfect »

Vulnerabilities discovered every day

The secure hardware is the best solution but it is not perfect

Be careful to the life cycle of products

• Any errors are attack paths

• Evaluation/Certification is good tool

Competent third party

National security (ANSSI)

TO CONCLUDE: SECURITY IS COMPLEX !

Page 24: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

| 24

• Difficulties to have a common global security model

What to protect ?

Attackers typology

• Security in the early phases of design.

Limit cost/complexity

Improve efficiency

CONCLUSION 2

Page 25: SECURITY FOR CONNECTED OBJECTS · | 2 • Cisco predicts 50B of connected object by 2020 • X-as-a-service a breakthrough for carrier’s business according to Ericsson • Estimated

Merci de votre attention