Koji Nakao, Dai Arisue NICT, Japan

Slides:



Advertisements
Similar presentations
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Information Security What is Information Security?
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
How To Remove Flooders?-Get Help Website:
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
Principles Identified - UK DfT -
Chapter 40 Internet Security.
Network security Vlasov Illia
Threat Modeling for Cloud Computing
BUSINESS DRIVEN TECHNOLOGY
Suggestion for Summarizing Process of the Principles
Risk management.
Firmware threat Dhaval Chauhan MIS 534.
Port Knocking Benjamin DiYanni.
Cybersecurity - What’s Next? June 2017
Chapter 7: Identifying Advanced Attacks
Network Security Basics: Malware and Attacks
Instructor Materials Chapter 7 Network Security
Comments on 18 mitigations proposed by OICA(TFCS-06-11)
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Security and Encryption
Network security threats
CYBERSECURITY FOR AUTONOMOUS VEHICLES
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Year 10 ICT ECDL/ICDL IT Security.
Security of a Local Area Network
Tool Server Workstation Router Universal
Security in Networking
I have many checklists: how do I get started with cyber security?
Network Security: IP Spoofing and Firewall
Internet of Things Vulnerabilities
The Internet of Unsecure Things
Home Internet Vulnerabilities
INFORMATION SYSTEMS SECURITY and CONTROL
Information Security Awareness
Faculty of Science IT Department By Raz Dara MA.
Network and security trends in connected cars
Security in SDR & cognitive radio
Test 3 review FTP & Cybersecurity
Security in mobile technologies
IoT: Privacy and Security
Cyber Security For Civil Engineering
A proposal for approach to proceed work in Cybersecurity TF
Security in Wide Area Networks
Presentation transcript:

Koji Nakao, Dai Arisue NICT, Japan Case Studies (existing incidents) -Identification of Threats and Vulnerabilities- Koji Nakao, Dai Arisue NICT, Japan

Background In the most of security incidents, vulnerabilities and threats are correlated. Each definition can be found in cybersecurity environment as follows: Threat: Potential cause of an unwanted incident, which may result in harm to a system or organization (ISO/IEC 27000) Vulnerability: Any weakness that could be exploited to violate a system or the information it contains (ITU-T X.1500) To practically identify threats and vulnerabilities, this contribution provides a set of existing incidents in the vehicle environment and recognize related threats and vulnerabilities. Recommended countermeasures are also identified (after ). This contribution will be helpful to study the countermeasures to be installed in the matrix.

Case 1: Remote hacking (Jeep) Two researchers have succeeded to intrude vehicle device control system via wireless connection. They did connect Vehicle LAN to control Vehicle (engine and handle…) using CAN commands. Vulnerabilities : 75(software bugs)  Bugs fixed. 92(system design exploited : inadequate design and planning or lack of adaption (D- Bus opened))  Vulnerability check & Security by Design Threats : 68 (Hardware or software, engineered to enable an attack or fail to meet design criteria to stop an attack)  Security by Design 24 (Malicious internal (e.g. CAN) messages)  Abnormal message detection 886 (Attacking vehicle internal network by illegally monitoring, changing, fabricating information and refusing service, etc.)  Illegal monitoring detection

Case 2: Misuse of after-marketing tool (insurance rate estimation tool) Insurance rate estimation tool was inserted to OBD-II port for sending vehicle information to the insurance company via mobile connection. Attackers maliciously used this vulnerable configuration and succeeded to intrude and control the vehicle (wiper and brake…). Vulnerabilities : 75(software bugs)  Bugs fixed 92(system design exploited : inadequate design and planning or lack of adaption)  Vulnerability check & Security by Design 33 (Damage caused by a third party. Sensitive data may be lost or compromised due to physical damages in cases of traffic accident or theft)  Tools/Devices provided by third parties need to be evaluated before implementing them Threats : 67 (Manipulation of hardware & software, Manipulation of information, e.g. hardware added to a vehicle to enable "man-in-the-middle" attack)  Manipulation detection 24 (Malicious internal (e.g. CAN) messages)  Abnormal messages detection 25 (Malicious infrastructure to vehicle messages (e.g CAM, DENM))  Abnormal messages detection 886 (Attacking vehicle internal network by illegally monitoring, changing, fabricating information and refusing service, etc.)  Illegal monitoring detection

Case 3: IoT malware injection (Mirai… ) IoT malwares (Mirai, Bashlight, Hajime…) are often injected to IoT devices including Vehicle devices. The malware Mirai was observed by sending DDoS traffic to the external systems or organizations. Once such malwares are injected inside a vehicle, the malware do almost everything including information leakage and using malicious internal messages and so on. Vulnerabilities : 75(software bugs)  Bugs fixed 93 (Using remainders from development (e.g. debug ports, JTAG ports, development certificates, developer passwords, …) to gain access to ECUs or gain higher privileges)  Vulnerability check & Security by Design Threats : 72 (Malicious software, Malicious software activity)  Malware detection 8(Dos: Sending a large number of garbage data to vehicle information system, so that it is unable to provide services in the normal manner) DoS mitigation facility needs to be implemented in the network sides/ DoS detection and cut off the connection 9 (vehicle used as a means to propagate an attack: Transmission of false/unreliable/contaminated data or V2V messages to other vehicles)  Malware detection and abnormal message detection 10(attack on external devices connected to a vehicle: Use of a vehicle as means to compromise connected devices) Monitoring the external traffic and detection of external attacks 11(attack on infrastructure: Transmission of false/unreliable/contaminated data to infrastructure) Existing countermeasures can be applied xx(attack on network: Vehicle acting as a botnet) Same with Threat 10 24(communication channels used to attack a vehicle: Malicious internal (e.g. CAN) messages)  Abnormal message detection

Case 4: Misuse of electronic device (smart key) “Smart Key” system is often utilized in many vehicles to start vehicle engine without insert key. Using this vulnerable system, an attacker gets the vehicle signal far distance from the vehicle and amplifies the signal to start vehicle illegally for stealing it. Vulnerabilities : 75(software bugs)  Bugs fixed 92(system design exploited : inadequate design and planning or lack of adaption)  Vulnerability check & Security by Design Threats : 68 (Hardware or software, engineered to enable an attack or fail to meet design criteria to stop an attack)  Vulnerability check & Security by Design 15 (Spoofing of messages (e.g. 802.11p V2X during platooning, etc.) by impersonation)  Strengthen authentication and encryption 886 (Attacking vehicle internal network by illegally monitoring, changing, fabricating information and refusing service, etc.)  Illegal monitoring detection

Case 5: Misuse of electronic device (Immobiliser) Immobiliser (electronic device that prevents an automobile engine from running without the key) was maliciously used for stealing the vehicle. There was a vulnerability that a malicious guy can register a new key to the vehicle with Immobiliser. Vulnerabilities : 93 (Using remainders from development (e.g. debug ports, JTAG ports, development certificates, developer passwords, …) to gain access to ECUs or gain higher)  Vulnerability check and security by design Threats : 68 (Hardware or software, engineered to enable an attack or fail to meet design criteria to stop an attack)  Vulnerability check & Security by Design 87 (Malicious remote instructions (e.g. activate or deactivate immobilizer, etc.)) Vulnerability check & Security by Design

Case 6: Misuse of specific application Vulnerability in the specific application of the electronic vehicle was misused to control air condition/fun and to obtain drive recode information through the Internet. No authentication system was implemented in the application. The attacker only used 5 digit of Vehicle ID to access the control. Vulnerabilities : 75(software bugs)  Bugs fixed 94 (Using deprecated methods for hashing cryptographic algorithms (e.g. MD5, SHA-1) e.g. to gain access to ECUs (by signing and installing unauthorized))  Strengthen cryptographic methods 93 (Using remainders from development (e.g. debug ports, JTAG ports, development certificates, developer passwords, …) to gain access to ECUs or gain higher)  Vulnerability check and security by design Threats : 87 (Malicious remote instructions (e.g. activate or deactivate immobilizer, etc.))  Vulnerability check & Security by Design

Case 7: Misuse of Wireless access (short PW) Length of Password was short enough to be hacked for wireless access in PHEV vehicle. A mobile application for remote control was hacked using this vulnerability to maliciously control light and air condition and so. In this case, there was no way to change the password in this specification. Vulnerabilities : 75(software bugs)  Bugs fixed 90 (Combination of short encryption keys and long period of validity enables attacker to break encryption)  Strengthen cryptographic methods 94 (Using deprecated methods for hashing cryptographic algorithms (e.g. MD5, SHA-1) e.g. to gain access to ECUs (by signing and installing unauthorized))  Strengthen cryptographic methods Threats : 87 (Malicious remote instructions (e.g. activate or deactivate immobilizer, etc.))  Vulnerability check & Security by Design

Case 8: Jamming attack and spoofing attack to sensors Chinese research team evaluated contactless attacks against millimeter wave radar, ultrasonic waves sensor, monitor camera sensors in vehicle equipped with devices for supporting safe driving. As the results, the researchers pointed out large possibilities that the vehicle will be damaged and/or crashed against jamming attack and spoofing attack. Vulnerabilities : 93 (Using remainders from development (e.g. debug ports, JTAG ports, development certificates, developer passwords, …) to gain access to ECUs or gain higher)??  Vulnerability check & Security by Design Threats : 3 (Jamming (via natural or unnatural interferences) of radio based (wireless) systems including navigation systems) Jamming detection and cut off the connection 15 (Spoofing of messages (e.g. 802.11p V2X during platooning, etc.) by impersonation)  Spoofing messages detection 68 (Hardware or software, engineered to enable an attack or fail to meet design criteria to stop an attack)  Vulnerability check & Security by Design