the dark ages of iot security - secure networkthe dark ages of iot security prof. stefano zanero,...

29
The Dark Ages of IoT Security Prof. Stefano Zanero, PhD

Upload: others

Post on 22-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

The Dark Ages of IoT Security

Prof. Stefano Zanero, PhD

Page 2: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Agenda

What is the Internet of Things

IoT (in)security

A real-world case study

The (scary) future of IoT security

Conclusions

Page 3: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things ?

Page 4: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

The IoT is the network of physical objects or "things" embedded with electronics, software,

sensors, and network connectivity, which enables these objects to collect and exchange data

Source: Wikipedia

Page 5: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

Things are physical objects

Things are connected with existing network infrastructure

Things collect data – physical world’s probes (!)

Things can be remotely controlled

Things exchange data with (some)thing

Page 6: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

(personal) things

Page 7: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

(home) things

Page 8: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

(industrial) things

Page 9: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

What is the Internet of Things

(medical) things

Page 10: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

Page 11: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

What is information security ?

Confidentiality

Integrity

Availability

The so called CIA paradigm (or triad) What about IoT security?

Page 12: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

IoT Security != Device Security

Page 13: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

Why? Think about mobile security world ! Mobile security is

The security of the mobile device

The security of installed apps

The security of 3rd party apps’ back-end systems

The security of pre-installed apps’ back-end (e.g., apps

store)

Now back to the IoT universe..

Page 14: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

Defining attack surface

“the attack surface describes all of the differentpoints where an attacker could get into

a system, and where they could get data out”

What about IoT attack surface ?

Source: OWASP

Page 15: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

EcosystemAccess Control

Device Memory Device Physical Interfaces

Device Web Interface

Device Firmware

Device Network Services

Administrative Interface

Local Data Storage

Cloud Web Interface

Third-party Backend APIs

Update Mechanism

Mobile Application

Vendor Backend APIsEcosystem

Communication Network Traffic

Page 16: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

Now, let’s talk about vulnerabilities

No alien technology, no extra-terrestrial bugs

OWASP defines an ad-hoc list for IoT Welcome to the OWASP IoT Top Vulnerabilities

It represents a list of vulnerabilities not risks

In 2014 the list was a canonical Top 10

Currently 13 vulnerabilities are included

Page 17: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

1. Username Enumeration

2. Weak Passwords

3. Account Lockout

4. Unencrypted Services

5. Two-factor Authentication

6. Poorly Implemented Encryption

7. Update Sent Without Encryption

8. Update Location Writable

9. Denial of Service

10. Removal of Storage Media

11. No Manual Update Mechanism

12. Missing Update Mechanism

13. Firmware Version Display and/or Last Update Date

Page 18: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

IoT (in)security

Slightly random thoughts on IoT security

IoT is “happening” with a rapidly (chaotic) development without appropriate considerations on security

More devices == more data == more cyber attacks

“Things” are probes in everyone’s life

Smart TV, cameras, thermostats are literally “watching” us !

Devices firmware update will be ruled by market – see ya security in 18 months?

Page 19: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Real-world case studies

Page 20: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Real-world case studies

Source: HP research on smart watches

Page 21: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Real-world case studies

Source: Rapid7 research on baby monitoring systems

Page 22: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Real-world case studies

Source: HP research on home security systems

Page 23: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

The (scary) future of IoT security

Page 24: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

The (scary) future of IoT security

Skynet is waiting

Page 25: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

The (scary) future of IoT security

50 BILLIONobjects by 2020

Source: Cisco

Page 26: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

The (scary) future of IoT security

Complexity. That’s the problem.

The Internet of Things is wild, open and no one will pay for secure (every)thing

Vendors are urgently called to implement solution secure by design to reduce the risks

An extensive standardization on “how things should be securely implemented” could be truly a panacea

Page 27: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Conclusions

Page 28: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Conclusions

We are brewing a perfect cyber-physical storm with unfathomable consequences

We are using complex networks of smart devices on which we increasingly rely for critical infrastructures and safety-critical systems, without humans in the loop

We have issues with zero-days as well as forever-days

We need significant engineering and research efforts to get this done and avert the storm

Page 29: The Dark Ages of IoT Security - Secure NetworkThe Dark Ages of IoT Security Prof. Stefano Zanero, PhD. Agenda What is the Internet of Things IoT (in)security A real-world case study

Thank [email protected]