Top Banner
Practical Security Assessments of IoT Devices and Systems TBC NCC Group Technical Security Consulting NCC Group Security Research
34

Practical Security Assessments of IoT Devices and Systems

Jul 15, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Practical Security Assessments of IoT Devices and Systems

Practical Security Assessments of

IoT Devices and Systems TBC

NCC Group Technical Security Consulting

NCC Group Security Research

Page 2: Practical Security Assessments of IoT Devices and Systems

Talk synopsis

This talk will discuss strategies and methodologies than can be

employed when assessing IoT devices. We'll look at how to develop

credible threat scenarios for different IoT device and systems, perform

static and dynamic attack surface mapping, perform static firmware

analysis, perform static hardware analysis, undertake a dynamic

device security analysis, sources of supporting information, supporting

capability requirements and establishment, Execution of dynamic

device analysis and approaches around network protocol analysis.

Page 3: Practical Security Assessments of IoT Devices and Systems

What we’ll zoom through

Understanding

Modelling

Technical Capabilities

Deep Dives

Assessing

Reporting

Page 4: Practical Security Assessments of IoT Devices and Systems

Internet of Things

What do we mean?

Page 5: Practical Security Assessments of IoT Devices and Systems

What is the IoT?

Page 6: Practical Security Assessments of IoT Devices and Systems

What is the IoT?

Page 7: Practical Security Assessments of IoT Devices and Systems

Understanding

Purpose, Use Case

& Design

Page 8: Practical Security Assessments of IoT Devices and Systems

Understanding

Page 9: Practical Security Assessments of IoT Devices and Systems

Understanding – Design

Device – components

Communications – protocols

System – what, where, how, when

Page 10: Practical Security Assessments of IoT Devices and Systems

Modelling

Threats & Resilience Expectations

Flows & Trust Boundaries

Page 11: Practical Security Assessments of IoT Devices and Systems

Modelling – Threats

Device level

Communication level

System level

Page 12: Practical Security Assessments of IoT Devices and Systems

Modelling – Resilience Expectations

Device level

Communication level

System level

Page 13: Practical Security Assessments of IoT Devices and Systems

Modelling – Flows & Trust Boundaries

On device – data and features

Device to system – traffic

System – data and functionality

Page 14: Practical Security Assessments of IoT Devices and Systems

Technical CapabilitiesDump

Observe

Interrogate

Debug

Page 15: Practical Security Assessments of IoT Devices and Systems

Technical Capabilities - Dump

Software - firmware (persistent storage)

Data (persistent storage)

Memory (non-persistent storage)

FPGA Bitstream files / CPLD JEDEC files (persistent)

Page 16: Practical Security Assessments of IoT Devices and Systems

Technical Capabilities - Dump

Removable storage e.g. SD card

via built-in functionality / debugging (in firmware)

via JTAG

via observing data transmitted across memory buses*

Chip-off analysis

Page 17: Practical Security Assessments of IoT Devices and Systems

Technical Capabilities - Observe

On device – I2C, SPI, USB, GPIO, generic..

Off device – RF (ZigBee, 6LoWPAN, 802.11, Bluetooth,

GSM/GPRS, Ethernet etc.)

Side Channels - RF / DPA etc.

System – end-to-end

Page 18: Practical Security Assessments of IoT Devices and Systems

Technical Capabilities - Debug

Chip level – JTAG

Device level – serial ports (e.g. console)

– software interfaces

– internal debugger (in firmware)

Network – RF / wired

– GDB stubs

System – end-to-end

Page 19: Practical Security Assessments of IoT Devices and Systems

Deep DivesObtain

Extract

Reverse

Identify

Page 20: Practical Security Assessments of IoT Devices and Systems

Deep Dives: Obtain

Documentation

SDKs

GPL etc.

Trigger auto-update then capture

network traffic (if SSL not used)

Firmware update bundles

Page 21: Practical Security Assessments of IoT Devices and Systems

Deep Dives: Extract

Structure

Clear-text / Encoding

Obfuscation

Compression

Encryption / Signatures

Page 22: Practical Security Assessments of IoT Devices and Systems

Deep Dives: Reverse

Boot loader

Operating system / software

Sensitive data

IP – data representing device characteristics e.g.

intelligent suspension / stability control

Page 23: Practical Security Assessments of IoT Devices and Systems

Deep Dives: Identify

Technologies

Security indicators

1st / 3rd party software

Open Source libraries

Security algorithms

Page 24: Practical Security Assessments of IoT Devices and Systems

Assess

Technical Techniques

Page 25: Practical Security Assessments of IoT Devices and Systems

Security Assessment / fuzzing tools

Page 26: Practical Security Assessments of IoT Devices and Systems

How to assess

Review configuration

Standard web app / product assessment methodologies

Use the product

Fuzz / correctness tests

Code review

Page 27: Practical Security Assessments of IoT Devices and Systems

Example

.. of the technical aspects ..

(i.e. excluding understanding / modelling)

Page 28: Practical Security Assessments of IoT Devices and Systems

Example: …

REDATCED

Page 29: Practical Security Assessments of IoT Devices and Systems

Summary & Conclusions

….

Page 30: Practical Security Assessments of IoT Devices and Systems

Summary & Conclusions

IoT = embedded systems + wider system

Approach = understand, model, ensure capability,

assess

… it’s not rocket science but it’s more complex than a

web app, mobile app or standard infrastructure

assessment …

Page 31: Practical Security Assessments of IoT Devices and Systems

Resources & Reading

Page 32: Practical Security Assessments of IoT Devices and Systems

Further Information

Detailed paper on how to

design and build securely

https://www.nccgroup.com/en/learni

ng-and-research-centre/white-

papers/security-of-things-an-

implementers-guide-to-cyber-

security-for-internet-of-things-

devices-and-beyond/

Page 33: Practical Security Assessments of IoT Devices and Systems

Further Information & Resources

- Binwalk - http://binwalk.org/

- JTAGulator - http://www.grandideastudio.com/portfolio/jtagulator/

- Face Dancer - http://goodfet.sourceforge.net/hardware/facedancer21/

- DevTTYS0 Blog - http://www.devttys0.com/blog/

- Tamper detection / Anti-tamper

.. plus many more ..

Page 34: Practical Security Assessments of IoT Devices and Systems

Europe

Manchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Milton Keynes

Amsterdam

Copenhagen

Munich

Zurich

North America

Atlanta

Austin

Chicago

Mountain View

New York

San Francisco

Seattle

Australia

Sydney