The Connected car and Security 2016 Alan Tatourian Security Architect, Advanced Driving Technologies, Intel Founding Member, Automotive Security Review Board (ASRB) Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups [email protected]October 6, 2016 7th Summit on the Future of the Connected Vehicle
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
The Connected car and Security 2016 Alan TatourianSecurity Architect, Advanced Driving Technologies, IntelFounding Member, Automotive Security Review Board (ASRB)Member, SAE VESS, TCG, and NIST Cyber-Physical Systems [email protected]
Security threats to automotive CAN networks —Practical examples and selected short-term countermeasures2008
Comprehensive Experimental Analyses of Automotive Attack Surfaces2011
Script Your Car!Using existing hardware platforms to
integrate python into your dashboard2013
A Survey of Remote Automotive Attack Surfaces2014
Remote Exploitation of an Unaltered Passenger Vehicle2015
CAN Message Injection2016
State of the Art: Embedding Security in Vehicles
2006
2017 2018 2019
6
What does Security Mean?
Security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction. Wikipedia
Existing Definition, also used by NIST
1999 National Academies study “Trust in Cyberspace”
Security research during the past few decades has been based on formal policy models that focus on protecting information from unauthorized access by specifying which users should have access to data or other system objects. It is time to challenge this paradigm of “absolute security” and move toward a model built on three axioms of insecurity:
1. insecurity exists;
2. insecurity cannot be destroyed; and
3. insecurity can be moved around’.
7
Response from the Industry2. SAE J3061 – Cybersecurity Guidebook for Cyber-
Physical Vehicle Systemsa) Enumerate all attack surfaces and conduct threat
1. Botnets2. Denial-of-service attacks3. Wireless networks4. Cloud platforms5. Massive data breaches6. Ransomware7. Malicious adware8. Internet of things9. Surveillance10. Cyber warfare
1. Secure coding and development processes
2. Threat intelligence and sharing
3. Adware blocking4. Denial-of-service
mitigation5. WiFi security
1970s 1980s 1990s 2000s
12
The Evolution of Malware
1980 1985 1990 1995 2000 2005
Source: escrypt
Increasing digitalization and digital integration
Security Escalation:
Hypothetical vulnerabilities identified
Security threats become relevant in practice
Regular security breaches with severe damages
Auto
ICS
Mobile Phones
PC
Servers
ICS-CERT(2008)
20152010 2020
???
CAESS(2010)
GSM Interface Exploit (2015)
Stuxnet and Duqu
(2010/11)German Steel Plant (2014)
AS/1 Card Cracking (2009)
IMSI Catcher, NSA iBanking
(2014)
Cabir, Premium SMS Fraud
(2008)DOS via SMS
DoCaMo (2008)
I Love You(2010)
Heart Bleed(2014)
Sasser(2004)
Melissa(1999)
Michelangelo(1992)
Leandro(1993)
Brain(1986)
F. Cohen(1981)
Confliker(2008)
NSA, PRISM Reign(2014)
SQL Slammer(2003)
Code Red(2001)
Morris Worm(1988)
Tribe Flood DDOS(1998)
CCC BTX Hack(1984)
Creeper(1971)
13
Need for new Thinking about Security
Every 30 years there is a new wave of things that computers do. Around 1950 they began to model events in the world (simulation), and around 1980 to connect people (communication). Since 2010 they have begun to engage with the physical world in a non-trivial way (embodiment – giving them bodies).Butler Lampson, Microsoft Research
Emer
ging
conc
erns
Secu
rity
Tech
nolo
gies
Attacks against Cyber-Physical Systems (CPS):1. Autonomous vehicles2. Smart communities3. Aviation and transportation4. Robots5. Drones6. Infrastructure
1. Self-adaptive Systems which can evaluate and modify their own behavior to improve efficiency, and which can self-heal.
2. Multi-agent Systems, a loosely coupled network of software agents that interact to solve problems, are resilient and partition tolerant.
3. Artificial Intelligence (Genetic Algorithms)
2010/2020s
14
Summary
1. Absolutely secure systems are impossible, with enough money and commitment any system can be broken
2. Assume your system is compromised and build it so that it can recover
15
Thank you!
15
Alan TatourianSecurity Architect, Advanced Driving Technologies, IntelFounding Member, Automotive Security Review Board (ASRB)Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups