Cyber-physical systems: a security problem Miguel Pupo Correia
Outline Insecurity in cyber systems Insecurity in cyber-physical systems Some research Conclusions
Insecurity in Cyber systems
May 12, 2017: WannaCry 2
How did it work? person at company opens an infected email (.zip attachment) opens attachment that infects the PC with WannaCry 2 malware infects other PCs exploiting vulnerability in Windows/SMB malware encrypts files, deletes backups, asks for ransom (ransomware)
Impact IT Systems Data $$$
Insecurity in Cyber-physical systems
Cyber-physical systems IT systems that interact with the physical world, using sensors and actuators Source: datasciencebe.com
Impact IT Systems Physical processes People / environment
Power generation/distribution Ukraine, Dec. 2016 – cyber-attack causes 1.5 hour outage across several regions Used Industroyer/CrashOverRide grid-sabotaging malware
Electricity generator DHS / CNN, Sept. 2007 Researchers who launched an experimental cyber attack caused a generator to self-destruct Attack can be do permanent damage
Pacemakers White Scope, June 2017 – Over 8,600 Vulnerabilities Found in Pacemakers researchers from security firm White Scope analyzed 7 pacemaker products from 4 different vendors
Some research
Replicating critical components CIS - CRUTIAL Information Switch CIS has N diverse replicas (3 in the figure) Intrusion-tolerant thanks to replication and voting Self-healing thanks to replica rejuvenation
Replicating critical components Replicas are rejuvenated, so % failed time is minimal % of failed time is zero unless the mift becomes less than 1 hour! Analysis made with stochastic models 4 servers minimum inter-failure time the prototype can rejuvenate all replicas in 10 minutes!
Trusted service in sensors/actuators T2Droid - TrustZone-based Trace analyser for anDroid Dynamic analysis of applications to detect malware Protected from malware by leveraging ARM TrustZone untrusted environment T2Droid
Trusted service in sensors/actuators T2Droid analyses the behavior of an apps by observing the calls it makes: API calls and syscalls i.MX53 USB armory
conclusion
Conclusion Cyber-physical systems are typically safety-critical Attacks may impact not only data/$$$, but humans / environment Threats are real; attacks are happening Two contributions CIS - CRUTIAL Information Switch T2Droid - TrustZone-based Trace analyser for anDroid
Thank you miguel. p. correia@tecnico. ulisboa. pt http://www. gsd This work was partially supported by national funds through Fundação para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013 (INESC-ID)