Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.

Slides:



Advertisements
Similar presentations
GALILEO and EGNOS Fotis Karamitsos, European Commission
Advertisements

Trusted Symbol of the Digital Economy 1 Bill Holmes – VP Marketing ID Platform - Smart Cards.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
Larry Wagner Sr. Director of Engineering
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Software Hardening & FIPS 140 Eugen Bacic & Gary Maxwell September 27th, 2005.
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Iron Key and Portable Drive Security Zakary Littlefield.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Geoencryption Demonstration Di Qiu, Sherman Lo, Per Enge August
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Applied Cryptography for Network Security
Towards Application Security On Untrusted OS
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Web Cryptography & Utilizing ARM TrustZone® based TEE for Authentication & Cryptography Ilhan Gurel September 10th & 11th, 2014.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
THE COMPANY ACORDE is a telecommunications company aimed at the design and development of products and services at the highest level of technology present.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Security Challenges for Customer Domain in the Smart Grid
GNSS Receiver - Software Radio Concept František Vejražka Czech Technical University in Prague Faculty of Electrical Engineering.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
GALILEO The European Programme for Global Satellite Navigation Services GALILEO 03/2004 EUROPEAN COMMISSION.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
Practical Attacks on a Proximity Card Jonathan Westhues June
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Cryptography and Network Security (CS435) Part One (Introduction)
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Wireless and Mobile Security
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
GPS Denial – Causes and Solutions Neil Gerein. NovAtel Inc. Proprietary Moving, or gathering data, you need to know where you are 2.
Security Issues in Information Technology
Web Applications Security Cryptography 1
LAS16-203: Platform Security Architecture for embedded devices
GPS - Global Positioning System
ABYSS : An Architecture for Software Protection
Summary of the results of discussions in the Mass Market (LBS) panel
Practical Cryptographic Civil GPS Signal Authentication
Microsoft Braindumps Braindumps Dumps4Download.us
Security in Network Communications
Protect Your Hardware from Hacking and Theft
SUSPICIOUS ACTIVITY DETECTION
IoT Security – fel vagyunk rá készülve?
Intel Active Management Technology
Security in SDR & cognitive radio
An Overview of Security Issues in Sensor Network
Presentation transcript:

Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US

September , Portland, US Where are we? GPS no civilian authentication. Egnos, no authentication, Galileo CS might not provide a ranging signal and Galileo SOL has been designed for different purposes, so we will have to rely on user segment authentication services for a while. The GNSS authentication community has dedicated the last 10 years to develop complex signal spoofing and signal authentication techniques, but it’s time to get back to the problem: how do we authenticate PVT? The GNSS community wants a clear answer for every application. Whilst following the security life cycle, PVT spoofing threats and mitigation can now be categorized to begin a process of receiver certification for PVT authentication.

September , Portland, US From an hypothetical classification of attacks…

September , Portland, US Towards a standardization of security requirements for commercial receivers? (example) SignalHardwareSoftwarePVT Data Level 1 Anti Spoofing based on position solution algorithms Integration of a trusted clock firmware upgrade protection Requires data authentication Data crypto key stored in Black memory Level 2 Anti Spoofing based on position solution algorithms Use of anti-tamper coating firmware upgrade protection Requires data authentication signal processing techniques (P(Y) correlation, SSSC, SAS) Integration of a trusted clock Data crypto key stored in Black memory Level 3 Requires ranging from signal with Navigation Message Authentication (NMA) secure key storage (red memory) firmware upgrade protection Requires data authentication Crypto accelerator (red memory) trusted boot ROM Data crypto key stored in Red memory trusted clock Level 4 Requires ranging from signal with Spreading Code Encryption (SCE) Tamper detection HW firmware upgrade protection Requires data authentication and encryption capability Requires red + black data Zeroization secure key storage (red memory) trusted boot ROM Data and signal keys stored in Red memory Requires secure code replica and correlators crypto accelerator (red memory) with secure random number trusted clock

September , Portland, US Conclusions While the research will continue towards new proposals for signal authentication, the industry should have a plan B for the next 10 years, developing algorithms at receiver level. A US-EU task force should be created to give clear responses (security requirement standards) to the civilian GNSS community.

Oscar Pozzobon Qascom S.r.l. Thank you!