Top Banner
1 Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto Research Manager, Cybersecurity Human Resource Development Research Center, NICT, Japan
27

Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Dec 25, 2019

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

1

Security issues related to Vehicles and Secure OTA Software Updates

Masashi EtoResearch Manager,

Cybersecurity Human Resource Development Research Center,NICT, Japan

Page 2: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Outline Observing current IoT Attacks

– Darknet basis attack observation

Understanding Infected IoT devices– IoT Honeypot and Sandbox

Secure OTA Updates for ITS/IoTsoftware/firmware– As one of the countermeasures against threats in

ITS/IoT environments -

2

Page 3: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

3

Observing current IoT Attacks

Page 4: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Scanning observation by darknet monitoring• Darknet:

–unused IP address range which is efficient for cyber-attack observation

• Capturing packetsthrough darknet inreal time basis.

• Color indicates theprotocol types.

4

Atlas All view

Atlas only port23

■UDP■TCP SYN■TCP SYN/ACK■TCP Other■ICMP

Page 5: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

23/tcp Scan from Embedded Device

Infected DevicesHome RouterWeb CameraNAS: Network Attached Storage etc. etc...

5

23/tcpOct. 2013 – Dec 2014

Page 6: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

The attacking hosts are IoT devices

150,000 attacking IPs

361 modelsobserved in 4 months

Page 7: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Why IoT devices?• 24/7 online

• No AV

• Weak/Default login passwords

• with global IP address and open to Internet

Page 8: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

8

Understanding Infected IoT devices

Page 9: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

We would like to know..

Malware Targets Monetization

• What kind of malware?

• How many different kinds?

• What IoT devices are targeted?

• What the attackers do after compromising these devices?

We have developed the first honeypot for IoT

Page 10: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Challenges

Honeypot Sandbox: IoTBOXIoT malware of different CPU Architecture

IoT devices listening on Telnet

ARM

PPC

SUPERH

X86

MIPSEL

MIPS

• Emulating diverse IoT devices• Handling to capture malware of

different CPU architectures• Handle to run malware of

different CPU architectures

Page 11: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Emulating different devices

• Different Banner Interactions• Scanning Internet on port 23 to get different banners

• Different User ID/Pass• Obtain weak/default ID/Pass by web search

• Different Interactions/Responses• Learn from actual devices• System with general configuration for embedded devices (e.g. OpenWRT…)

3-way handshake

(Options)

Welcome message& Login prompt

id/passAuthenticatio

n

CommandResponse

.........

Do Echo, Do NAWS, Will Echo* NAWS (Negotiate About Window Size)

ADSL Routerlogin:

root12345

cat /bin/sh

corresponding responses

Banner Interaction

Authentication

Command Interaction

cat /bin/sh

ARM

MIPS

PPC

Response 2

Device Profile Different Banner

Interactions

Different User

ID/Pass

Different Responses

Page 12: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

IoTPOT results

• During 122 days of operations [ April 01 to July 31 - 2015]

0

50,000

100,000

150,000

200,000

250,000

Visit Login Download Malware

Uni

que

Host

Cou

nt

• 90,394 Malware Download Attempts• Malware of 11 different CPU architectures• 93% of downloaded binaries are new to Virus

Total (2015/09)

Page 13: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

General flow of telnet based attacks

Attacker or already infected IoT

1. Login attempts using dictionary attack

Malware DL server

C&CServer

3. DownloadMalware

4. Attack command

Scan 23/TCPDoS

Malware (binary)Malware (shell)

2. Series of Telnet Commands

Page 14: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Attack Example1: DNS Water Torture attacks

Infected devices

Cache DNSserver at ISP

9a3jk.cc.zmr666.com?elirjk.cc.zmr666.com?pujare.cc.zmr666.com?oiu4an.cc.zmr666.com?

Authoritative DNSfor“zmr666.com”

9a3jk.cc.zmr666.com?elirjk.cc.zmr666.com?pujare.cc.zmr666.com?oiu4an.cc.zmr666.com?

Delayed replyNo resource

Page 15: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Attack Example-2: Click fraud

Infected devices imitates user clicksto advertising web sites

Infected Devices

Page 16: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Attack Example-3: Stealing credential from PPV

credentialParticular set top boxes are being targeted (such as dreambox)

Page 17: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Looking back on devices visiting IoTPOT

10734

4856

1391787 430 411 337 206 206 174 60 20 19 15 11 10 10 9 6 6

0

2000

4000

6000

8000

10000

12000

Num

ber o

f IP

Addr

esse

s

Device Types

More than 60 different types (361 models) of devices visit IoTPOT

• We scan back on port 23/TCP and 80/TCP• More than 60 type of devices visit us

Page 18: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Web interfaces of devices attacking us

Page 19: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Categorizing IoT device types infected by Malwares

Category Device Category Device

Surveillance Group

IP Camera Industrial Control System

Solid State RecorderDVR Internet Communication Module

Networking Related Devices

Router Data Acquisition ServerGateway BACnet I/O ModuleModem Personal Web CameraBridge Personal Video RecorderSecurity Appliance Home Automation Gateway

Telephone System

VoIP Gateway Broadcasting Facility

Digital Video BroadcasterIP Phone Digital Video ScalerGSM Router Video Encoder/DecoderAnalog Phone Adapter Settop Box

Infrastructure

Parking Management System Other Heat PumpLED display control system Fire Alarm System

Disk Recording SystemOptical Imaging FacilityFingerprint Scanner

Page 20: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

AS with more than 1,000 infected IoT Devices

Page 21: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Key findings through our challenges– Malware

• At least 6 DDoS malware families target IoT devices via Telnet• Malware samples of 11 different CPU architectures are captured• 93 % of samples are new to Virus Total• One family has quickly evolved to target more devices with as many

as 9 different CPU architectures

– Targets• More than 60 types (361 models) of IoT devices are infected

– Monetization• 11 types of DDoS attacks• Scans (TCP/23,80,8080,5916 and UDP/ 123,3143) • Fake web hosting• Click fraud attacks• Stealing credential of PPV and so on

Page 22: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

22

Secure OTA Updates for ITS/IoT software/firmware- One of the countermeasures against threats in ITS/IoT environments -

Page 23: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Development of an ITU-T Recommendation• ITU-T: International Telecommunication Union, Telecom

sector– SG17: Responsible for security standards

• Title of Recommendation– “Secure software update capability for ITS communications

devices” (X.itssec-1)

• Purpose– to provide common methods to update the software by a secure

procedure including security controls and protocol definition

– The adoption of the Recommendation is not mandatory for automotive industries, but the Recommendation would be a guideline of the baseline security for networked vehicle.

• Editors– Masashi Eto (NICT)– Koji Nakao (KDDI/NICT)

23

Page 24: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Secure OTA Updates for ITS/IoT software/firmware

• General model of networked vehicle

On-board Information DevicePower Management Control ECUSeat Belt Control ECUDriving Support ECUParking Assist ECUSkid Control ECUetc.,

Vehicle Mobile Gateway

(Head Unit)

Aftermarket Information Device

Update Server /log database

Car Manufacturer / Garage center

CommunicationPath....

....CommunicationPath

Supplier

This procedure is under development for ITU-T Recommendation (will be fixed in September, 2016)

Focused Area

Page 25: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

An example of ITS software remote update procedure

Request of diagnose of software status

Result of diagnose with software status

Report of results of ECUs in a vehicle

Receipt for submit of diagnose report

Request of update module

Update module is provided

Notification to User (driver) for Updates

Confirmation for the update

Request for updates to ECUs

Results for updates in ECUs

Report of application of the update

Conformation from the Update server

25

Page 26: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

Conclusion<Security Key Controls for ITS/IoT environments>

1. Threat observation/analysis and Vulnerability detection2. Malware/intrusion detection3. Remote curing method for vulnerable IoT devices4. Remote OTA Software Update (ITU-T)5. Data Confidentiality

– Light-weight crypto6. Appropriate Authentication and Access control7. Incident handling and Information (threat) sharing

26

IoT devicesEnvironments

The Networked Car

environments

Page 27: Security issues related to Vehicles and Secure OTA ... · Security issues related to Vehicles and Secure OTA Software Updates Masashi Eto. Research Manager, Cybersecurity Human .

27

Thank you for your attention!