Cyber Physical System Security

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Software Security & Privacy Risks in Mobile E-Commerce Kartikeya Kakarala CSCI 5939-Independent Study Wireless Application Protocols.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
Department of Computer Science and Engineering University of Washington Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gun Sirer, Marc E. Fiuczynski,
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O Presenter: Probir Roy Computer Science Department College of William & Mary.
EXTENSIBILITY, SAFETY AND PERFORMANCE IN THE SPIN OPERATING SYSTEM B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers,
Software Construction
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Cloud Usability Framework
Adversaries in Clouds: Protecting Data in Cloud-Based Applications Nick Feamster Georgia Tech.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
On-Chip Control Flow Integrity Check for Real Time Embedded Systems Fardin Abdi Taghi Abad, Joel Van Der Woude, Yi Lu, Stanley Bak, Marco Caccamo, Lui.
Stack Management Each process/thread has two stacks  Kernel stack  User stack Stack pointer changes when exiting/entering the kernel Q: Why is this necessary?
SEC835 Database and Web application security Information Security Architecture.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
ISA 562 Internet Security Theory & Practice
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Protecting e -Government Against Attacks Gernot Heiser NICTA and University of New South Wales.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Writing Systems Software in a Functional Language An Experience Report Iavor Diatchki, Thomas Hallgren, Mark Jones, Rebekah Leslie, Andrew Tolmach.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCE 548 Secure Software Development Security Operations.
Jini Architectural Overview Li Ping
Computer System Structures
GridOS: Operating System Services for Grid Architectures
ALEX RUNNER Jason Rosselot Sedar labarre Will Farrell Johnson Controls
Information Security, Theory and Practice.
CSCE 548 Secure Software Development Risk-Based Security Testing
Welcome Network Virtualization & Hybridization Thomas Ndousse
Development of an Embedded Platform for Secure CPS Services
CIM Modeling for E&U - (Short Version)
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Security Models and Designing a Trusted Operating System
Security of In-Vehicle Software
Harini Kolamunna Yining Hu Diego Perino Kanchana Thilakarathna
IOT Critical Impact on DC Design
John Backes, Rockwell Collins Dan DaCosta, Rockwell Collins
Information Technology Sector
Integrated Cyber October 16-17, 2017
Security Issues.
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION Third Edition ANDREW S
Operating System Structure
TRUST:Team for Research in Ubiquitous Secure Technologies
Distributed System Concepts and Architectures
Broad Emerging Themes in CPS/IoT
Secure Autonomous CPS Through Verifiable Information Flow Control
Avionics Panel Go For Luna Landing!
Building Systems That Flexibly Control Downloaded Executable Content
Bastion secure processor architecture
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Specification of Countermeasures for CYRAIL
How to Mitigate the Consequences What are the Countermeasures?
Sustainable Mobility for Rural Small University Towns
A Trusted Safety Verifier for Process Controller Code
Computer Science and Engineering
Shielding applications from an untrusted cloud with Haven
The Italian Academic Community’s Electronic Voting System
NSA Security-Enhanced Linux (SELinux)
John Backes, Rockwell Collins Dan DaCosta, Rockwell Collins
Trust by Design: The Internet of Things
Presentation transcript:

Cyber Physical System Security University of South Florida Xinming (Simon) Ou SCOWCT Annual Meeting Oct 26, 2016

Key Issue in CPS Security Cyber breaches may drive physical processes/systems to an unsafe state. Smart buildings Smart grids Smart cars Smart transportation Smart city Smart …

What might future ITS look like? TMC

Cybersecurity Challenges Complete isolation between the transportation control network and the Internet may not be feasible Increasing number of points of entry Adversaries may compromise devices connected to the control network

A Related Project: Building Security Buildings are ubiquitous critical infrastructure, yet often the last to be considered as such Building Automation Systems (BAS) are a class of complex network-based distributed system BAS is a system of Cyber- Physical Systems

Bio-Containment Facility Example Scenario Bio-Containment Facility

Key Safety Requirement Mockup BAS for a Zone The BAS is responsible for: Security control Interlock control Fire alarm control Decontamination control Temperature control Air pressure control Key Safety Requirement

Differential Pressure Requirement Exhaust airflow Supply airflow

Big attack surface, serious risks Zero security in communication Little Protection for Controller and Processes on it

Current Controllers Fall Short Software vulnerable to arbitrary code injection Compromised applications can infect/impact others Devices on the network lack trust

What do We Need from Controllers? Process Isolation Robust Design with Small Trusted Computing Base Explicit Management of Critical Constraints Device/task Identification and Network Access Control

How to Secure the Controllers? Kernel is the “pinch point” of all information flows, including malicious ones. In monolithic kernels the entire OS works in kernel space with absolute power With time OS gets bigger, more complex, slower, and more error prone Nearly impossible to secure the entire OS Microkernel: easier path to security

Two Candidate Microkernels MINIX 3 Free, open-source microkernel OS; developed over 30 years (V3 released in 2005) 4000 LOC Small, simple, and easy to modify Lack of real-time support, Lack of formal verification seL4 “The world's first operating-system kernel with an end-to-end proof of implementation correctness and security enforcement” 10.2 KLOC Support real-time constraints (not formally verified yet)

Secure RTOS Architecture Process isolation with microkernel Fine-grained mandatory access control Real-time guarantees even with presence of malice Platform unforgeable identity and proxy- based network communication Co-existing with unmodified legacy OS and apps

Current Efforts Modify MINIX to support Mandatory access control for Inter Process Communication and network communication Real-time property enforcement Understand seL4 with an eye towards targeting implementation Design a constraint language to model the security/safety properties of the system Map domain requirements to kernel policies

Benefits Build security in – fundamentally change the "breach and patch" cycle Manage security and safety in the same framework Support diverse constraints for different types of buildings; extensible to other CPS domains Minimize barrier to adoption by allowing running existing untrusted legacy devices

Going back to the Transportation System Will integration with other CPSes become a trend/need? Will controllers/PLCs be widely used in ITS? What are the possible safety failures for future ITSes?