EMBEDDED SYSTEM SECURITY YIFAN HAO XIAOSHU LIU ZHIHONG LUO EMBEDDED SYSTEM SECURITY Like PC in 1990s Too many programs are developed Operation Worse A system is vulnerable than PC in 1990s variety of embedded systems Hardware hacking is easier Consequences are more severe https://www.schneier.com/blog/archives/2014/01/security_risks_9.html EMBEDDED SYSTEM SECURITY Sorts of embedded security issues Software security Hardware Network security security SOFTWARE SECURITY Link to Paper: https://jhalderm.com/pub/papers/dcvoting-fc12.pdf “We successfully changed every vote and revealed almost every secret ballot,” writes the researchers — Scott Wolchok , Eric Wustrow, Dawn Isabel and J. Alex Halderman Another paper in Indian voting machine: https://jhalderm.com/pub/papers/evm-ccs10.pdf SOFTWARE SECURITY Most attacks are via software Cryptographic Code attacks injection attacks Stack-based buffer overflows Heap-based buffer overflows Etc. SOFTWARE SECURITY Example - Stack-based buffer overflows http://www.drdobbs.com/security/anatomy--‐of--‐a--‐stack--‐smashing--‐attack--‐and--‐h/240001832 SOFTWARE SECURITY Example - Stack-based buffer overflows http://www.embedded.com/design/safety-and-security/4304104/Security-fundamentals-for-embedded-software SOFTWARE SECURITY Possible No security strategies unknown source program in execution space Non-executable stack Read-only memory Strong data privacy and encryption Hardware-assisted protection http://embedded-computing.com/articles/5-steps-secure-embedded-software/ NETWORK SECURITY What is network security Sources Ways of network attack to manage risk http://atlantatsinc.com/images/networksecurity.jpg NETWORK SECURITY Federal Aviation Administration warned Boeing that its new Dreamliner aircraft Boeing 787 had design problem. Hackers could hack the aircraft from passengers’ Wi-Fi network. Navigation system or control system could be hijacked http://www.foxnews.com/story/2008/02/20/how-to-hack-into-boeing-787.html NETWORK SECURITY Activities network designed to protect your Give reliability, usability, integrity and safety to network http://blog.legalsolutions.thomsonreuters.com/wp-content/uploads/2012/01/wiretap.png NETWORK SECURITY Attack categories: Passive attack Active attack Threat sources: Wiretapping: a third party monitoring your network Port scanner: probes the host to find the current service Idle scan: send garbage to the host to find available service DoS (Denial of Service Attack): service rejects the legal user Man in the middle: attacker cheat the server and client NETWORK SECURITY Man in the middle Third party relays or possibly alter the message Server and client believe they are talking directly to each other Secret message getting stolen might lead to severe outcome to the country https://upload.wikimedia.org/wikipedia/commons/thumb/e/e7/Man_in_the_middle_attack.svg/1280px-Man_in_the_middle_attack.svg.png?1457916082920 NETWORK SECURITY Method Anti to improve network security virus and anti spyware Firewall Intrusion Virtual Key prevention system private network authentication NETWORK SECURITY Key authentication Public key: A public key encrypts a message. Public key is publicly known. Private key: A private key decrypts a message. Private key is only known by owner. Needham-Schroeder protocol Public key encryption An encryption mechanism where two keys are used. A public key is used to encrypt the message and a secret private key to decrypt the message. Advanced encryption algorithm Diffi-Hellman key exchange Needham-Schroeder protocol http://oz.stern.nyu.edu/fall99/readings/security/ecc1_3.gif HARDWARE SECURITY Credit Card Skimmer Malicious card reader that grabs data off the magetic stripe. Create cloned cards, and steal money Credit Card Skimmer Credit Card Skimmer http://www.mlive.com/news/ann-arbor/index.ssf/2016/03/credit_card_skimmer_found_at_a.html HARDWARE SECURITY Credit Card Skimmer Malicious card reader that grabs data off the magetic stripe. Create cloned cards, and steal money Things can get worse .. Use the CAN bus in the car Take control of braking, acceleraion ... http://www.computerworld.com/article/2903714/60-diy-car-hacking-device-is-an-inexpensive-and-easy-way-to-hack-cars.html HARDWARE SECURITY Pyramid of Trust Each layer can rely on the effective security of its underlying layer without being able to verify it directly A perfect software security solution will be useless with a weak hardware protection Lots of Methods of Hardware Hacking ... https://diy.org/skills/hardwarehacker HARDWARE SECURITY Side-Channel Analysis Definition - any attack based on information gained from the physical implementation of a cryptosystem Types Timing Analysis - timing due to program branches Simple Power Analysis (SPA) Power supply currents Electromagnetic Analyses (EMA) - Electromagnetic Radiation HARDWARE SECURITY SPA analysis on RSA IC power consumption depends on activity of transistors Variations in power consumption occur as the device performs different operations RSA If a bit of the binary private key is di = 1, we square + multiply If the bit is 0, we just square Power consumption of Multiplication and Square are different Side channel attack http://www.nicolascourtois.com/papers/sc/sidech_attacks.pdf HARDWARE SECURITY Solution Hardware Security Modules (HSM) Payment Physical Etc. Card Industry (PCI) HSM Isolation EMBEDDED SYSEM SECURITY Reference: https://www.schneier.com/blog/archives/2014/01/security_risks_9.html https://jhalderm.com/pub/papers/evm-ccs10.pdf https://jhalderm.com/pub/papers/dcvoting-fc12.pdf http://embedded-computing.com/articles/5-steps-secure-embedded-software http://www.foxnews.com/story/2008/02/20/how-to-hack-into-boeing-787.html http://www.computerworld.com/article/2903714/60-diy-car-hacking-device-is-aninexpensive-and-easy-way-to-hack-cars.html http://www.mlive.com/news/annarbor/index.ssf/2016/03/credit_card_skimmer_found_at_a.html http://www.nicolascourtois.com/papers/sc/sidech_attacks.pdf EMBEDDED SYSEM SECURITY Q&A