EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim.

Slides:



Advertisements
Similar presentations
Office of Emergency Communications Gateway Training Workshop Module One Basic Gateway Overview.
Advertisements

With your instructor, Jeremy Hyland
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 19: Network Management Business Data Communications, 4e.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Heuristic Evaluation IS 485, Professor Matt Thatcher.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Health Informatics Series
Review an existing website Usability in Design. to begin with.. Meeting Organization’s objectives and your Usability goals Meeting User’s Needs Complying.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
For the Public Safety Community
Narrowband Basics For the Wildland Firefighter Community November 11, 2005.
Conventional vs. Trunking Radio Systems
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
Wireless Networking 102.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SEC835 Database and Web application security Information Security Architecture.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
Project 25 (P25/APCO-25) Radio Kyle Bashford (ISC 496 Fall 2014)
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Cryptography, Authentication and Digital Signatures
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Event Management & ITIL V3
MULTIMEDIA DEFINITION OF MULTIMEDIA
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Information Security What is Information Security?
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Usability 1 Usability evaluation Without users - analytical techniques With users - survey and observational techniques.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Cognitive Radio: Next Generation Communication System
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Role Of Network IDS in Network Perimeter Defense.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
NATO UNCLASSIFIED 1 TETRA Applications for Military Communications Radio Branch NATO Command, Control & Consultation Agency Radio Branch NATO Command,
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
IS3220 Information Technology Infrastructure Security
Unit 32 – Networked Systems Security
Tomorrow's Solutions Today 111 Digital Trunked Radio Scanning Review “in plain language” Developed and produced by On Target Training & Consulting, LLC.
1 Bosch Communications Systems MTRBi MOTOTRBO™ Professional Digital Two-Way Radio System Interface. Confidential |ST/MKP-AM-Lio | 10/29/2010 | © 2010 Robert.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Computer Networks Chapter 5 – Analog Transmission.
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Presentation transcript:

EE515/IS523 Think Like an Adversary Lecture 7 UI and Psychological Failures Yongdae Kim

Recap ^ ^ policy  Include [ee515] or [is523] in the subject of your ^Class Presentation Assignments are made ^Always check calendar ^Text only posting, ! ^Preproposal meeting this week  Group leader sends me three 30-min time windows between Wednesday and Friday (evening is OK)

Recap ^Access Control Matrix  ACL, Capabilities, Role-based ACL ^User Interface  Too many warnings…  Password Authentication  Text, graphical, hardware token, biometrics, …  Phishing: Psychological failure!

Policy and Usability

Cost of Reading Policy Cranor et al. ^ T R = p x R x n  p is the population of all Internet users  R is the average time to read one policy  n is the average number of unique sites Internet users visit annually ^ p = 221 million Americans online (Nielsen, May 2008) ^ R = avg time to read a policy = # words in policy / reading rate  To estimate words per policy:  Measured the policy length of the 75 most visited websites  Reflects policies people are most likely to visit ^ Reading rate = 250 WPM Mid estimate: 2,514 words / 250 WPM = 10 minutes

^ n = number of unique sites per year  Nielsen estimates Americans visit 185 unique sites in a month:  but that doesn’t quite scale x12, so 1462 unique sites per year. ^ T R = p x R x n = 221 million x 10 minutes x 1462 sites ^ R x n = 244 hours per year per person

P3P: Platform for Privacy Preferences ^ A framework for automated privacy discussions  Web sites disclose their privacy practices in standard machine-readable formats  Web browsers automatically retrieve P3P privacy policies and compare them to users’ privacy preferences  Sites and browsers can then negotiate about privacy terms

Why Johnny Can’t Encrypt - A Usability Evaluation of PGP 5.0- Alma Whitten and J.D. Tygar Usenix Sec’99 Presented by Yongdae Kim Some of the Slides borrowed from Jeremy Hyland

Defining Usable Security Software ^Security software is usable if the people who are expected to use it:  are reliably made aware of the security tasks they need to perform.  are able to figure out how to successfully perform those tasks  don't make dangerous errors  are sufficiently comfortable with the interface to continue using it.

Why is usable security hard? 1.The unmotivated users  “Security is usually a secondary goal” 2.Policy Abstraction  Programmers understand the representation but normal users have no background knowledge. 3.The lack of feedback  We can’t predict every situation. 4.The proverbial “barn door”  Need to focus on error prevention. 5.The weakest link  Attacker only needs to find one vulnerability

Why Johnny can’t encrypt? ^PGP 5.0  Pretty Good Privacy  Software for encrypting and signing data  Plug-in provides “easy” use with clients  Modern GUI, well designed by most standards ^Usability Evaluation following their definition If an average user of feels the need for privacy and authentication, and acquires PGP with that purpose in mind, will PGP's current design allow that person to realize what needs to be done, figure out how to do it, and avoid dangerous errors, without becoming so frustrated that he or she decides to give up on using PGP after all?

Usability Evaluation Methods ^Cognitive walk through  Mentally step through the software as if we were a new user. Attempt to identify the usability pitfalls.  Focus on interface learnablity. ^Results

Cognitive Walk Through Results ^Irreversible actions  Need to prevent costly errors ^Consistency  Status message: “Encoding”?!? ^Too much information  More unneeded confusion  Show the basic information, make more advanced information available only when needed.

User Test ^User Test  PGP 5.0 with Eudora  12 participants all with at least some college and none with advanced knowledge of encryption  Participants were given a scenario with tasks to complete within 90 min  Tasks built on each other  Participants could ask some questions through

User Test Results ^3 users accidentally sent the message in clear text ^7 users used their public key to encrypt and only 2 of the 7 figured out how to correct the problem ^Only 2 users were able to decrypt without problems ^Only 1 user figured out how to deal with RSA keys correctly. ^A total of 3 users were able to successfully complete the basic process of sending and receiving encrypted s. ^One user was not able to encrypt at all

Conclusion ^Reminder If an average user of feels the need for privacy and authentication, and acquires PGP with that purpose in mind, will PGP's current design allow that person to realize what needs to be done, figure out how to do it, and avoid dangerous errors, without becoming so frustrated that he or she decides to give up on using PGP after all? ^Is this a failure in the design of the PGP 5.0 interface or is it a function of the problem of traditional usable design vs. design for usable secure systems? ^What other issues? What kind of similar security issues? What do we learn from this paper?

Why (Special Agent) Johnny (Still) Can’t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, M. Blaze Usenix Sec’11 Presented by Yongdae Kim Slides borrowed from Matt Blaze

APCO Project 25 (“P25”) ^Standard (in the US and elsewhere) for digital two-way radio (voice and low-speed text)  Widely fielded by government: local police & fire dept, federal law enforcement & security services, DoD  Standard under ongoing development since early 90’s.  P25 products increasingly available since early 2000’s. ^Drop-in replacement for analog FM systems  User narrow band channels, limited infrastructure  Can use simplex, repeaters, or trunked infrastructure ^Cryptographic security options  Content confidentiality (encryption)

P25 Equipment ^Wide range of COTS subscriber radios available  Mobile, portable, base and infrastructure ^Several US vendors  Motorola dominates in federal law enforcement sector ^Equipment features and user interfaces (somewhat) standardized across vendors.

P25: Deployed Examples

The P25 Voice Protocol ^Narrow-band radio channel (12.5 Khz)  Co-exists with analog FM  9,600 bps (4,800 2bit symbols/sec) ^IMBE vocoder  Reasonable speech quality  Train of 1,728 bit voice frames that encode 180ms of audio ^“Broadcast” model  All transmissions “one-way”, no ACKs or sessions  Error correction codes Header Data Unit Logical Link Data Unit 1 Logical Link Data Unit 2 Logical Link Data Unit 1 Logical Link Data Unit 2 Terminator Data Unit

P25 Optional Security Features ^Symmetric key encryption  Unclassified: AES, DES, …  Classified: various Type I ^Traffic keys must be loaded into radios in advance  Via keyloader device or over-the- air rekeying  Keys can expire, self destruct ^No “sessions”  Sender radio selects crypto mode & key  Up to receiver to decrypt ^Received cleartext always demodulated & played ^Received ciphertext decrypted & played if correct key available ^No authentication ^Sender’s radio makes all security decisions  Radios can be configured for always clear, always encrypted, or user selected  User-selected is standard configuration

Highlights ^Apparently ad hoc design  No formal (or informal) security requirements specified in P25 standard  But traffic encryption itself isn’t obviously broken ^But does suffer significant protocol weakness  No authentication  Susceptible to (active and passive) traffic analysis  Radio unit IDs sent in clear even when encryption enabled  Vulnerable to very efficient Denial of Service  13 dB energy advantage to attacker ^Serious crypto-usability weakness

Passive and Active Traffic Analysis ^Subscriber radio’s unit ID, TalkGroup ID, NAC sent with every transmission  24 bit unit ID is typically unique to each radio  Effectively identifies individual radio + agency it belongs to ^Standard supports encryption of Unit ID  But they found UID always in clear, if crypto enabled ^Radios typically automatically respond to pings  Active adversary can easily discover idle radios  Transparent to pinged radio

Scenario ^Ping response is sufficient to allow automated direction findings of targeted radios  Requires two bases at fixed location with phased directional antenna ^Adversary can thus create a real0time map of selected radios, even when they are “idle” ^Significant potential threat in military environment

Denial of Service (in theory) ^P25 uses aggressive error correction codes  But individual subfields of transmission are error-corrected separately ^Adversary can select a single subfield to jam within frame  Pattern at start of transmission makes synchronization easy ^Voice frame is 1,728 bits, including critical 64bits NID subfield that IDs frame type  Jamming 64 bits renders entire 1,728 bit frame useless  32 symbols of jamming per 864 symbols ^Jammer needs 14dB less energy than the transmitter  Compare: Analog FM requires (about) equal energy to jam  Jamming digital spread spectrum requires much more energy

Denial of Service (in practice) ^How hard is to build a P25 subfield jammer? ^TI CC1110 is a single-chip digital radio transceiver chip  Supports native protocol very similar to P25  Sufficiently close to recognize start of P25 frames… ^User in GirlTech IMME toy instant messenger ($15)  So they developed their own P25 jammer firmware…  Their first jammer

Scenario: Selective Jamming ^Need not to jam every P25 transmission ^Jammer is low duty cycle  Spends most time in receiving mode  Can be programmed to recognize certain types of transmissions and interfere only with them ^Easy to configure a jammer that recognizes and disables only encrypted P25 signals  Force users to switch to clear in order for communication to work

Potential Usability Problems ^Poor feedback about crypto state  Transmit crypto is controlled by an obscurely marked toggle switch  Switch’s state has no effect on received audio  Clear always accepted in encrypted mode  Encrypted accepted in clear mode (if keyed) ^Frequent rekeying + unreliable rekeying  Many agencies use short-lived keys  But, re-keying is difficult and unreliable

Poor Crypto Feedback ^Remember “Why Johnny can’t encrypt?” ^Radios are typically configured to control outbound crypto with a two-position switch  Often obscurely marked, out of view ^Little feedback to user about crypto state other than the switch itself  “Encrypted” icon on display  Configurable “clear” beep warning  But the same beep used to indicate other things. ^Little chance for other users to notice or help  Received cleartext always accepted, even when their own switch is in the “secure” position

Motorola XTS5000: Clear Mode

Motorola XTS5000: Secure Mode

No Ad Hoc Field Keying ^If even a single user lacks current keys, there is usually nothing a team can do  Key cannot be created or entered by hand into radio  Keyloader hardware is not typically available in the field.  OTAR frequently fails in practice ^Often only practical option is for an entire operation to go to clear

P25 COMSEC in practice ^The P25 traffic analysis and DoS attacks they found are potentially serious, but require some expertise and resources on part of adversary  Current off-the-shelf equipment can’t easily implement most of the protocol-level attacks we found without modification  Inexpensive software-defined radio will soon change this, however  Not much can be done to mitigate these vulnerabilities without changing P25 protocols in any case ^More serious are usability weaknesses that can be easily exploited by anyone, today: A significant volume of law-enforcement-sensitive cleartext regularly goes over the air, without users unaware.

Unintended Sensitive P25 Cleartext ^They accidently misconfigured a P25 radio in their lab, and were surprised to hear chatter from a federal tactical surveillance operation  This turned out not to have been a fluke event ^They subsequently collected statistics about unintended over- the-air sensitive cleartext in several metropolitan areas  Focused on confidential tactical law-enforcement traffic  Omitted local agencies, non-covert operations (e.g. interop networks, uninformed FPS patrols), etc.  No encrypted traffic captured  Used only readily-available, unmodified consumer-grade equipment  Live monitored samples of traffic, recorded traffic statistics.

Intercepting the Federal Spectrum ^2000 discrete VHF and UHF voice channels allocated to Federal government  24 MHz of spectrum  12.5 KHz channels  Law enforcement mixed in among less sensitive users  Some agency channels are widely known, others not. ^Easy to identify the channels used locally for covert tactical LE activities  They are the ones with encrypted traffic on them. ^Many P25 receivers on market ^Icom R-2500  Aimed at hobby “scanner” market, includes P25 options  Legally available to anyone

Results ^Searched the Federal VHF and UHF spectrum for the frequencies used for sensitive tactical networks  Likely candidate frequencies easy to identify: they carry mostly encrypted traffic ^Configured a small network of R-2500 receivers in several metropolitan areas with software to systemically scan these networks and log incidence of cleartext  Periodically “live monitored” samples of cleartext audio  Did not retain identifiable information about agencies or targets ^In each metropolitan area:  Most tactical traffic was apparently successfully encrypted  But still > 20 min (mean) sensitive cleartext per city per day  High variance; lower volume on weekends and holidays

How Sensitive is Sensitive? ^The P25 unintended cleartext they live-sampled included some of the most sensitive investigative data  Names and/or identifying features of targets and confidential informants, their locations, description of undercover agents  Information relayed by Title III wiretap plants  Plans for forthcoming takedowns and operations  Wide range of crimes, some involving targets that appeared to employ reasonably sophisticated countermeasures  Sensitive cleartext captured from virtually every DoJ & DHS LE agency ^Mostly law enforcement / criminal, but we were not looking for military or intelligence traffic.

What is going wrong? ^Three categories of unintended cleartext:  Single user error: one user transmitting in clear, but communicating with an encrypted team  Group error: everyone in clear, indicated they were encrypted, no one noticed they weren’t  Keying failure: one member of group did not have key, so everyone went to clear ^Cleartext they sampled was roughly evenly split between single/group error and keying failure.

Observations ^P25 tactical radio crypto capability is now widely deployed by federal law enforcement ^Yet, Federal P25 networks still carry quite a bit of easily intercepted LE sensitive cleartext ^Two dominant causes, each requiring different mitigating approaches  Accidental cleartext (about half the time)  Keying failure (about half the time) ^Mitigations  P25 protocols and products require a top-to-bottom redesign for security  Should not be considered reliable secure, until then.  Authors suggested some short term solution.