Figure 5: Sample Table for Medical Devices

advertisement

INTERNATIONAL CYBER CENTRE, GEORGE MASON UNIVERSITY

Roots of Trust for Cyber

Physical Systems

Final Report

Arun K. Sood, PI

Duminda Wijesekera, Co-PI

Bo Yu, Research Assistant

8/1/2014

Submitted to

Cyber Security Research Alliance

TABLE OF CONTENTS

LIST OF FIGURES ...................................................................................... 2

1.0

Introduction .................................................................................... 3

1.1 Methodology ....................................................................................................................................... 3

1.2. Rest of the Report ............................................................................................................................. 4

2.0

Transportation ................................................................................ 4

3.0

Medical Devices .............................................................................. 8

4.0

What is Common .......................................................................... 12

5.0. Protege Implementation ................................................................ 12

6.0. How to use the result ..................................................................... 16

6.1. Query 1:............................................................................................................................................ 17

6.2. Query 2 ............................................................................................................................................. 17

6.3. Query 3 ............................................................................................................................................. 18

6.4. Query 4 ............................................................................................................................................. 19

6.5. Query 5 ............................................................................................................................................. 20

7.0 Potential Uses and Relationship with Other Work .......................... 21

8.0. Conclusions .................................................................................... 23

Appendices ........................................................................................... 24

Roots of Trust for Cyber Physical Systems Page 1

LIST OF FIGURES

Figure 1: Sample Table for Transportation Systems

Figure 2: The Distribution of Backward References and Forward References for Transportation

Figure 3: High-level Structure of the Transportation Domain

Figure 4: Structure of the Air Transportation Systems

Figure 5: Sample Table for Medical Devices

Figure 6: The Distribution of Backward Forward and backward References for Medical Devices

Figure 7: Control System View of Medical Devices

Figure 8: High Level Structure of the Medical Devices Domain

Figure 9: High-Level View of the Cyber System for Medical Devices

Figure 10: Top Level of the Ontology

Figure 11: Expansion of the Attack Class and the Counter measure Class

Figure 12: Vulnerabilities and Attacks that Exploit them – high level

Figure 13: Vulnerabilities and Attacks that Exploit them – Details

Figure 14: Attacks and Countermeasures – high level

Figure 15: Attacks and Countermeasures – Details

Figure 16: Related Vulnerabilities, Attacks and Countermeasures

Figure 17: Query 1

Figure 18: Query 2

Figure 19: Query 3

Figure 20: Query 4

Figure 21: Query 5

Figure 22: Structure and View of Security Ontologies

Roots of Trust for Cyber Physical Systems Page 2

Roots of Trust for Cyber Physical Systems

1.0

Introduction

Security of Cyber Physical Systems (CPS) is an area of growing concern. There is special focus on physical systems that are vital for the wellbeing of the population at large. These include Critical Infrastructures and devices for health care. To achieve a high level of security of the CPS devices it is necessary to identify the fundamental elements that ensure the dependability and trustworthiness of CPS. These elements constitute the Roots of Trust of a given CPS. The large variety of CPSs has led to a wide variety of elements defining the Roots of Trust. Further, the inconsistent terminology used in the different spaces, makes it difficult to relate the vulnerabilities and attacks in one domain to those in another domain. The focus of this project was to contribute to the development of a common terminology and to study approaches to find gaps that need to be bridged.

Two teams worked on this project – a team at Drexel University and another one at George Mason

University. This report is based on the work undertaken by the Mason team. At an early stage, it was decided that the Mason team should focus on the transportation and medical device domains.

1.1 Methodology

The Mason team noted that there was a large body of knowledge in the transportation and medical devices domains. To begin the transportation sector was divided into Road, Rail and Air, and restricted the Healthcare domain into medical devices. Team decided to undertake the project in two phases.

First phase involved data collection and organization. In this phase we focused on an understanding of the structures that would be useful in defining the domains and subdomains. We looked for commonality among the subdomains and across the domains. Second phase focus was on using the structures developed in Phase I to build taxonomies and ontology and importing these into Protégé.

Running queries against the partly populated Protégé database shows the usefulness of the whole procedure.

Phase 1 methodology:

1.

Choose key words and find a set of articles in IEEE or ACM in the last 5 years.

2.

Manually scan abstract, if relevant to the root of trust, keep the article and go to 4

3.

Manually scan introduction and conclusion, if relevant to root of trust, go to step 4 else catalog and remove from further processing

4.

Find forward and backward references to the selected set of publications.

5.

Find the relationships between the publications. Identify the reachability of the citations: a.

Are there links to subdomains? b.

Are there links to other domains?

Roots of Trust for Cyber Physical Systems Page 3

Using the criteria noted above, our electronic search yielded 150 publications for the transportation domain. These were down selected to 54 publications based on a careful reading of the indexed terms, the introduction and the conclusions and an understanding of the vulnerabilities, exploits and suggested solutions (if any). Similarly, we found 282 publications for the medical device domain and selected 46 publications.

Phase 2 methodology:

Using the outcome of Phase 1, we created an Ontology that reflects the root of trust relations we were able to ascertain from the literature. The ontologies were created to be cognizant of other modeling

(such as vulnerabilities, exploits and mitigation techniques) commonly used in the area of cyber security and the secure development life cycles.

1.2. Rest of the Report

The rest of this report describes the detailed findings of the two domains we studies. Section 2 describes the transportation domain and Section 3 describes the Healthcare domain.

2.0

Transportation

Phase 1:

Our search was conducted on IEEE and ACM libraries using the following criteria

Key Phrases: root of trust for transportation, cyber physical system

Time Duration: 2009 to 2014

Our search provided 150 papers. Then we manually selected a sample of 54 publications from them and created forward and backward references for them that were published either by IEEE or ACM but within 2009 to 2014 time period. The forward references were obtained using Google Scholar. Then we tabulated the results in a spreadsheet that is provided as Appendix 1 of this report. A sample is shown in

Figure 1.

Roots of Trust for Cyber Physical Systems Page 4

Figure 1: Sample Table for Transportation Systems

RefNo.

Ref1

Ref2

Sybil

Title

Leveraging platoon dispersion for detection in vehicular networks

Unified

Invariants for

Cyber-Physical al. "Unified

Invariants for

Switched

System

Stability

Citation

Paul, Tamal, et

Cyber-Physical

Switched

System

Stability." 1-9.

Root of Trust formalism for invariant interaction and incremental invariant composition

Backward Reference

’10), New York, 2010, pp. 1–11.

[3] S. Bensalem, A. Legay, T.-H Nguyen, J. Sifakis, and R.

Yan, “Incremental invariant generation for compositional design,” in Proc. 4thIEEE Int. Symp. Theoretical Aspects

Software Eng. (TASE), Aug. 2010, pp. 157–167.

Root of Trust

Forward

Reference

Mutaz,

Muhammad Al,

(A Sybil attack is one where an adversary assumes multiple

Levi Malott, and identities to defeat trust of an

Sriram

Chellappan. existing reputation system.);

Sybil detection

"Leveraging platoon dispersion for

Sybil detection

Sybil threat in Intelligent

Transportation Systems (ITS)

[2] A. Studer, E. Shi, F. Bai, and A. Perrig, “Tacking together efficient authentication, revocation, and privacy in vanets,” in Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON’09. 6th Annual IEEE

Communications Society Conference on. IEEE, 2009, pp.

1–9..

[4] T. Zhou, R. Choudhury, P. Ning, and K. Chakrabarty,

“P2dapsybil attacks detection in vehicular ad hoc networks,” Selected Areas in Communications, IEEE

Journal on, vol. 29, no. 3, pp. 582–594, 2011.

[8] S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense the Sybil threat in

ITS by designing techniques that integrate

[1]

Chellappan,

Sriram.

"Cyber-

Clustering ideas (in Physical the Cyber domain) Approaches with Platoon

Dispersion theory

(in the Physical domain); for Designing

Trustworthy

Intelligent

Transportati on Systems." in vehicular networks." against Sybil attack in vehicular ad hoc network based on roadside unit support,” in IEEE Military Communications

Conference (MILCOM), 2009, pp. 1–7.

2014

Privacy,

Security and

Trust (PST), public key crypto [16] A. Wasef, R. Lu, X. Lin, and X. Shen, “Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless 2013 Eleventh

Annual

International

Conference on.

IEEE, 2013.

remote sensing imagery networks],” Wireless Communications, IEEE, vol. 17, no.

5, pp. 22–28, 2010.

[18] Q. Tan, Q. Wei, S. Yang, and J. Wang, “Evaluation of urban road vehicle detection from high resolution remote sensing imagery using object oriented method,” in Urban

Remote Sensing Event, 2009 Joint. IEEE, 2009, pp. 1–6.

bridges the gap between [1] Y. Zhu, E.Westbrook, J. Inoue, A. Chapoutot, analytic models and simulation C.Salama,M.Peralta, T. Martin, W. Taha, M. O’Malley, R. codes Cartwright, A. Ames, and R. Bhattacharya, “Mathematical equations as executable models of mechanical systems,” in Proc. 1st ACM/IEEE Int. Conf. Cyber-Physical Syst.(ICCPS

Figure 2: The Distribution of Backward References and Forward References for Transportation

Backward References Forward Reference

10

5

0

25

20

15

40

30

20

10

0

0 1 2 3 4 5 6 7 30 0 1 2 3 4 5 6 11 19

Figure 2 shows the distribution of backward references and the distribution of forward references where the horizontal and vertical axes are respectively the number of papers and the number of backward/forward references to papers within our collection. So for example, 20 papers did not have backward references within our collection. The information we found leads to the conclusion that as a group the selected publications has few references to the selected publications .

Roots of Trust for Cyber Physical Systems Page 5

We were also able to conclude the following attribution for root of trust

Sensors (mentioned by 28 selected papers)

Actuators (mentioned by 6 selected papers)

Communications (mentioned by 23 selected papers)

Controller (mentioned by 21 selected papers)

Operator (mentioned by 3 selected papers)

We also looked at the objective of the security mechanisms proposed by these papers and found the characterization as given in Table 2.

Table 2: Categorization of Security Objectives

Component Availability Integrity

Sensor

Actuator

Communication

16/28

3/6

12/23

18/28

6/6

18/23

Controller 17/21 11/21

Operators

Phase 2:

3/3 3/3

We used the information contained in our tables and created an Ontology. The high level structure of the ontology is given in Figure 3.

Roots of Trust for Cyber Physical Systems Page 6

Figure 3: High-level Structure of the Transportation Domain.

Transportation

Physical System

Automobile Rail

Air

(See Sub-figure

“Air”)

Vehicle infrastructural

Component

Personal

Vehicle

Public

Bus

Cargo truck

Road Highway

Communication system Wheel

Control

Engine

Control

Entertainment

Breaking

System

Human I/O

Devices

Navigation

Assistance

Power

Supply

Traffic

Light

Street

Light

Road

Sensor

Information

Display

Toll

Station vehicle

Infrastructural

Component

Passenger

Train

Cargo

Train

Subway

Train

Station

Railroad

Track

Signal

System

Engine

Control

Train

Control

Breaking

System

Communication

System

Power and Fuel

Management

System

Wayside

Device

Communication

System

Power

Supply

Track Control

System

Pilot

Other

Vehicle

Operator Infrastructure

Operator

Transportation

Cyber System

Computation

Component

Driver human Tester

Control

Component

Communication

Component

Software

Developer

Policy Maker

Control

Center

Process Store Network

Access Device

Interface

Performance

Evaluation

Algorithm

Design

In-Network

Base

Station

Central

Storage

Distributed

Storage

DSRC* WiFi

Gateway

Interface

Network Node

Interface

Base Station

Interface

2G/3G/4G WAN

DSRC*:Dedicated short-range communications

As Figure 3 show, we concentrated on automobile, air and rail subsystems. The Automobile sector was further decomposed into vehicles and infrastructural components. Vehicles were further sub divided into personal vehicles, public buses and cargo trucks. Infrastructural components were further subdivided into highway structures and road structures. An equivalent decomposition exists for the air and rail components.

Due to the large number of systems used in air transportations systems, we demonstrate their hierarchical structure in Figure 4. Air transportation sector was modeled using the same structure as the other transportation domains, but have a more complex infrastructure component consisting of a ground system component and an air traffic control system. The ground system consists of a fuel supply system, power supply system and an airport infrastructure. We focused on the airport infrastructure and did not detail the first two components. The Air Traffic system is further decomposed into an air navigation infrastructure and vehicle component. The air navigation system is further decomposed as the RADAR system, sensors, automatic landing system and automatic dependent surveillance infrastructure.

In addition, the bottom left hand side of Figure 3 shows the structural view of human involvement in transportation systems consisting of the roles of pilots, drivers, other vehicle operators, policy makers, software developers and testers.

The right-hand side of Figure 3 shows that abstractly, the transportation systems we analyzed consists of three main components control, computation and communication. The decomposition of each of these systems is also shown in our Ontology.

Roots of Trust for Cyber Physical Systems Page 7

Figure 4: Structure of the Air Transportation Systems

Air

Air

Vehicle

Infrastructural

Component

Fixed Wing Helicopter

Ground

Infrastructural

Air Traffic

Control System

Parts Systems Airport power supply fuel supply

Air Navigation

Infrastructural

Air Control

Infrastructural

Landing

Gear

Empennage Wing

Engine Fuselage

Communication

Radio

Computer Flight

Control System

Electronic System

Hydraulic Flight System

Electric

Generator

VHF

Radio

UHF

Radio

Ground

Sensor

Airport Control

Center

Parking

Facility

Passenger

Check in

Fingers Runway

Airport

Light

Navigation

AIDs

Aerodrome Traffic

Zone (ATZ)

Terminal Control

Area (TCA)

Area Control

Center (ACC)

Ground

Radar Passenger

Security

Customs

Information

Provider

Airport

Beacon

Taxiway

Light

Runway

Light

Airport Transportation

Vehicle

Information

Desk

Flight Information

Board

Threshold

Lights

VASI

Luggage

Transfer Truck

Passenger

Transfer Vehicle

Radar

Beacon

Distance Measuring

Equipment (DME)

Instrument Landing

System (ILS)

VHR

Omnidirectional

Range (VOR)

Automatic Direction

Finder (ADF)

Automatic Dependent

Surveillance

Broadcast (ADS-B)

3.0

Medical Devices

Phase 1:

Our search was conducted on IEEE and ACM libraries using the following criteria

Key Phrases: root of trust for medical devices, cyber physical system

Time Duration: 2009 to 2014

Our search provided 282 papers. Then we manually selected a sample of 46 publications from them and created forward and backward references for them that were published either by IEEE or ACM between

2009 and 2014. The forward references were obtained using Google Scholar. Then we tabulated the results in a spreadsheet that is provided as Appendix 2 of this report. A sample is shown in Figure 5.

Roots of Trust for Cyber Physical Systems Page 8

Figure 5: Sample Table for Medical Devices

Figure 6 shows the distribution of backward references and the distribution of forward references where the horizontal and vertical axes are respectively the number of papers and the number of backward/forward references to papers within our collection. So for example, 20 papers did not have backward references within our collection. The information we found leads to the conclusion that as a group the selected publications have only a few references within the collection.

Figure 6: The Distribution of Backward Forward and backward References for Medical Devices

5

0

15

10

25

20

Backward References

0 1 2 3 4 5 6 7 30

20

15

10

5

0

35

30

25

Roots of Trust for Cyber Physical Systems

Forward Reference

0 1 2 3 4 5 6 11 19

Page 9

Further analysis of selected papers on the security of medical devices

Phase 2:

We noticed that security objectives realted to Medical Devices and their applications are based on the following factors.

1.

Sensors/Medical Devices

1.

Interoperability

2.

Energy Efficiency

3.

Physical Protection

2.

Data Quality

1.

Data Confidentiality

2.

Data Authentication

3.

Data Integrity

4.

Data Availability

5.

Data Freshness

Figure 7 gives control system’s view of medical devices.

Figure 7: Control System View of Medical Devices

Roots of Trust for Cyber Physical Systems Page 10

Figure 8: High Level Structure of the Medical Devices Domain

Healthcare

Hospital Recovery Home

Pervasive

Healthcare elderly care

Communication infrastructure

Actuation

Server

Web Server

Game Server

Telemedicine

Server

Medical Server

Integration

Server

Database Server

Base Station /

Access Point (AP)

Communication

System

Sensor

Node accelerometers

(ACC)

Heart Rate

(HR) Monitor

Pacemaker

Deep Brain

Stimulator

Endoscope capsule

Endoscope capsule

Glucose

Monitor

pH monitor

Imaging

Sensor Device electroencephalography

(EEG)

Cardiac Arrhythmia

Monitor/Recorder

Pulse oximeter

SpO2

Thermometer

Electrocardiography

(EKG) photoplethysmogram

(PPG)

Blood pressure monitor

Brain liquid pressure sensor

Fall Detection

Motorized

Artificial Leg

Motorized

Artificial Arm

Position/Movement

Detection

Bluetooth-enabled defibrillator

drug infusion pump surgery robot insulin pump

GUI Smart Devices Caregiver Alarm

Gateway

pump Artificial Limb Robot defibrillator Pacemaker

PDA

Smart

Phone

Sensor A/D converter Microcontroller Transceiver

Figure 8 describes the high-level view of medical devices. We focused on the home health care related medical devices for this study. As Figure 8 shows, home health care devices have a communication subcomponent and an actuation sub component. The communication structure is further decomposed into Servers, consisting of web servers, telemedicine servers and other specialized medical servers. The communication substructure consists of base stations, sensor nodes and gateways to servers. There are many kinds of sensor nodes such as accelerometers, heart rate monitors, pacemakers, deep brain simulators endoscope capsules etc. Actuation consists of having a caregiver using a GUI using a smart device mostly equipped with an alarm.

Figure 9: High-Level View of the Cyber System for Medical Devices

Cyber System

Patient caregiver observer

Application designer

Software developers human

Pervasive people

Hardware engineer

Control/Actuation component

Computation component

Communication componet

Performance evaluation

Algorithm design process store Network

Access device

In-network

Base station cloud

Central

Storage

Distributed

Storage

System

BAN/PAN WAN

Base station

Network node

Gateway

IEEE 802.11g/

WiFi

IEEE 802.11n/

WiFi

IEEE 802.16e/

WiMAX

IEEE 802.20

IEEE 802.15.4

IEEE 802.22

WiBro

Roots of Trust for Cyber Physical Systems Page 11

Figure 9 show the high level view of the cyber physical system involved in medical devices consisting of control/actuation, computation and communication. The control and actuation system has algorithms and protocols that need to meet a minimum performance standard for the device to provide the required services. The computation system consists of processes and data stores. The computation component consists of a network and accessing devices. The network consists of multiple protocols. The access system consists of base stations, networked nodes and network gateways.

In addition, the left hand side of Figure 9 shows the structural view of human involvement in home healthcare related medical device systems consisting of the roles of patients, caregivers, observers

(those that are around the patient such as family and visitors), hardware engineers, software developers, applications designers and pervasive system designers.

4.0

What is Common

One of the goals of this research was to identify the commonality in Roots of Trust between the different domains studied. The Roots of Trusts used in the two domains studied did not have much in common. The publications reviewed did not explicitly indicate the trust basis – the implied Roots of

Trust were derived by a review of the publication. We discovered commonality at the level of the underlying technical basis used. Some of the publications use the classical control loop as the basis of the analysis. For security of CPS systems the Roots of Trust for each component of the control should be included.

The Mason team found that a few papers implied that the human operator was part of the trust framework. Because we were driven by the trusted computing (TPM) model, we expected that most of the trust basis would be based on hardware. Thus the discovery of human as part of the trust chain was unexpected. Having human as part of trust formulation explicitly justifies policies related to training, retraining, certification, use of two person decision systems, enforced leaves of specific duration etc.

5.0. Protege Implementation

We modeled the Ontology using Protégé, which we provide as an accompaniment to this document. We now describe the motivations for our class structure. Our design has two top-level subclasses, CPS and

Human. These model Cyber Physical Systems and Humans interactions with them. CPS systems were

Roots of Trust for Cyber Physical Systems Page 12

modeled into Physical Systems (components) Cyber Components, Attacks and Countermeasures. Figure

10 shows the top four levels taken as a screen scrape from the Protégé editor.

Figure 10: Top Level of the Ontology

A reason for having this four-level division is partly influenced by the desire to be consistent with modeling the operational environment (akin to Physical Components) Cyber Component (the software)

Attacks and their countermeasures. This is closer to the standard modeling of Configurations (including hardware and software), known vulnerabilities (for example given by NISTs CVSS) Exploits (akin to

Attacks) and Countermeasure. This modeling also enables attack graph or attack surface based analysis of cyber physical systems.

The next level expands upon the top-level classes. Figure 11 show one more level of expansions of the

Attack class and Countermeasure class. These classes were chosen due to our analysis of the selected publications in the transportation and medical devices domains.

Roots of Trust for Cyber Physical Systems Page 13

Figure 11: Expansion of the Attack Class and the Counter measure Class

Figure 12 shows how we linked Attacks to Vulnerabilities. Similarly, Figure 13 shows the relationship between attacks and their countermeasures. Figure 14 further shows the relationship between vulnerabilities, attacks and their countermeasures are related (shown in Green in the figure)

Figure 12: Vulnerabilities and Attacks that Exploit them – high level

Roots of Trust for Cyber Physical Systems Page 14

Figure 13: Vulnerabilities and Attacks that Exploit them – Details

Figure 14: Attacks and Countermeasures – high level

Roots of Trust for Cyber Physical Systems Page 15

Figure 15: Attacks and Countermeasures – Details

Figure 16: Related Vulnerabilities, Attacks and Countermeasures

6.0. How to use the result

This section shows how our Ontology answers some relevant questions by showing screen shots from our query results. In order to do so, we selected the following two papers from medical devices CPS reference into Ontology

Roots of Trust for Cyber Physical Systems Page 16

Reference 20: Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signing and encryption

Reference 25 - Assurance of Energy Efficiency and Data Security for ECG Transmission in BASNs

6.1. Query 1:

Query in English: “What component(s) of CPS are vulnerable to message corruption attack ?”

Explanation: The ontology has some “object properties” showing the relationships between different attacks and CPS components. For any CPS, the query retrieves all (CPS) components vulnerable to any kind of message corruption attacks (i.e. those components that will be affected by an integrity attack).

Figure 17: Query 1

6.2. Query 2

Query in English: “Which attack(s) can be prevented by using strong encryption and authentication techniques and which sub-class(es) in CPS support them?”

Explanation: The ontology uses “object properties” to model the relationships between different attacks and countermeasures that are offered as built in mitigating techniques by those components. The query retrieves those attacks of a CPS system where a strong encryption is offered as a mitigating solution.

Roots of Trust for Cyber Physical Systems Page 17

Figure 18: Query 2

6.3. Query 3

Query in English: “Which paper(s) proposed techniques against privacy attack ?”

Explanation: Every referenced paper proposes one or more techniques to prevent one or more attacks.

The query retrieves all papers that provide a solution technique against privacy attacks.

Roots of Trust for Cyber Physical Systems Page 18

Figure 19: Query 3

6.4. Query 4

Query in English: “Which paper(s) proposed techniques related against link layer attack ?”

Explanation: This query is similar to the previous one. It retrieves papers that propose solutions against link-layer attacks.

Note: Reference 25 “selected encryption mechanism” provides a solution that can prevent privacy attack and attacks against link layers.

Roots of Trust for Cyber Physical Systems Page 19

Figure 20: Query 4

6.5. Query 5

Query in English: “Which paper(s) proposed techniques related against physical attack ?”

Explanation: Similar to the previous query, but there is no paper satisfying the selection criteria of the query

Roots of Trust for Cyber Physical Systems Page 20

Figure 21: Query 5

7.0 Potential Uses and Relationship with Other Work

Functional

Requirements

Security

Objective

Infrastructure

Use Cases

Misuse

Cases

Vulnerability

Environment

CVSS

Trust

Trust Roots

Establishment

Maintenance

Tear Down

Figure 22: Structure and View of Security Ontologies

Roots of Trust for Cyber Physical Systems

Mitigation

Techniques

Exploitation

Attacks

Attack

Graphs

Attack

Surfaces

Page 21

Figure 22 shows the high-level landscape of a security landscape. The figure uses the convention that an entity / concept is a darker shade of the same color and an instance, a representation or an aspect is shown in lighter color. The figure is drawn to show an Ontology for enterprise level engineering that is present in CPS systems, consisting of functional requirements (specified as Use Cases in the SDLC jargon), Security requirements (specified as Misuse Cases that are to be avoided by design and in implementations), physical and software infrastructure, and the operational environment. Security vulnerabilities (reported in CVSS and other public repositories are exploited to create attacks (these can be modeled as attack graphs or attack surfaces) and if exploited would result in either a loss of Use

Cases or the enablement of Misuse Cases. Given the plethora of attacks and the vulnerabilities that they exploit, many mitigation techniques have been designed over the years. Trust is one such class of mitigation techniques that have been used over the last 25 years of security practice. Trust is used to ensure the authenticity and consequently advertised functionality of a component (either software, hardware or a combination thereof). Given this view of security engineering, our Ontology covers security and functional objectives (such as continuous operations and privacy), infrastructure in both transportation and home based medical devices, their vulnerabilities, mitigation techniques and the role played by trust and roots of trust in the latter.

A logical extension of our work and an immediate application is to extend our Ontology to include measurable aspects of security. Given that securing any system has a cost, and any enterprise weights the cost vs. benefits, having an industry standard nomenclature specialized to the CPS domain would benefit current and future enterprises. An introduction to this aspect and the languages available to start such as an effort have been collected by MITRE at their Making Security Measurable web site 1 [1].

They recommend the following minimum standards:

Measurable Entity Extension of Our Ontology

Software Assurance

Application Security

Vulnerability, Exploitation

Vulnerability, Exploitation, Functional Requirements, Security

Objective

Assert Management

Malware Protection

Vulnerability Management

Environment, Infrastructure

Security Objective, Vulnerability, Exploitation

Patch Management

Configuration Management

Vulnerability, Exploitation, Trust Root

Environment, Infrastructure, Trust Root

Cyber Intelligence Threat Management Vulnerability, Exploitation

Supply Chain Risk Management

Malware Protection

Vulnerability, Exploitation,

Trust Root, Infrastructure, Environment

Vulnerability, Exploitation, Mitigation Techniques

Intrusion Detection

Cyber Threat Information Sharing

System Assessment

Vulnerability, Exploitation, Mitigation Techniques

Trust Root

Vulnerability, Exploitation, Functional Requirements, Security

Objective, Mitigating Techniques

Incident Coordination

Enterprise Reporting

Remediation

Vulnerability, Exploitation, Mitigating Techniques

Vulnerability, Exploitation, Mitigating Techniques

Vulnerability, Exploitation, Mitigating Techniques

1 http://measurablesecurity.mitre.org/index.html

Roots of Trust for Cyber Physical Systems Page 22

Although not addressed by the high level, risk management is an important aspect of asset management, that is beneficial to the CPS community. Consequently, the Ontology we have developed can be elaborated with security metrics, eventually leading to a quantifiable risk profile for industry to use by instantiating with the parameters of their specific system.

8.0. Conclusions

We setout with the objective of determining a taxonomy to describe root of trust in CPS systems. In order to do so, we looked at two specific domains of CPS systems – transportation and medical devices.

Our process involved searching for IEEE and ACM libraries for publications based on keywords that represent roots of trust in the respective CPS subdomains. This search resulted in 156 and 282 papers.

This was followed on by manually reading the papers and selecting a sample that would reveal the root of trust in subdomains. We then created hierarchies that represented the subdomains with potential roots of trust. We found that the primary purpose of having a root of trust was to ensure the security of the applications in environments that had vulnerabilities that could be exploited to attacks that enabled particular mal-intents.

Consequently, our hierarchical representation of roots of trust embodied the security objective environment, vulnerabilities, the attacks that exploited them, security objectives that that could have been violated by the attacks and the solutions that prevented such exploitations. The roots of trust were a corner stone of these security objectives.

We found that the two CPS subdomains had differing security objectives and vulnerabilities and attacks and consequently different mitigating solutions that were anchored on roots of trust. As stated in

Section 3, mitigating solutions anchored their roots of trust on sensors, actuators, communication infrastructure, control systems and human operators. Similarly, as shown in Section 4, the medical devices domain has communication, controls system, actuation, computation and the human elements consisting of hardware engineers, software/firmware engineers, application designers, caregivers, patients and observers such as friends and family of the patient.

Then we took this information and created an Ontology using Protégé, a popular ontology editor. The output of the process is available in the form of an RDF file. We then ran some sample queries to show the utility of our work. Lastly we show how our work fits in with and can be used by other areas of securing infrastructure.

Roots of Trust for Cyber Physical Systems Page 23

Appendices

(Submitted separately)

Appendix 1: Transportation Data Set

Appendix 2: Medical Devices Data Set

Appendix 3: Protégé Data Set

Roots of Trust for Cyber Physical Systems Page 24

Download