Cybersecurity for Computer- Controlled Physical Systems System-Aware Cybersecurity Barry Horowitz University of Virginia September 2015 1.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
GAMMA Overview. Key Data Grant Agreement n° Starting date: 1 st September 2013 Duration: 48 months (end date 31 st August 2017) Total Budget:
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
TRANSPORTATION AND CARGO SECURITY Presented by : Aysar Naserallah.
System Aware Cyber Security NDIA Barry Horowitz University of Virginia February, Sponsor: DoD, through the Stevens Institute”s SE Research Center.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Determining the True Root Cause(s) of Accidents and Safety Incidents Incident Investigation and Analysis.
Systems Engineering in a System of Systems Context
Security Controls – What Works
Information Security Policies and Standards
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Lecture 11 Reliability and Security in IT infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
Information Systems Security Computer System Life Cycle Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
Emergency Planning Steps 5 steps in emergency planning Step 1: Establish a team Step 2: Analyze capabilities and hazards Step 3: Conduct vulnerability.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Fostering a ‘Whole Community’ Approach to Emergency Management David J. Kaufman Director, Office of Policy and Program Analysis 8 June 2011.
CHILD FOCUS Belgian Safer Internet Centre How to raise awareness among children, young people and their educators? Example of practice Nadège BASTIENEN.
Dr. Charles W. Beadling Central Asia Regional Health Security Conference April 2012 Garmisch-Partenkirchen, Germany.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
New River Valley Emergency Communications Regional Authority
1.less than 3 million. 2.less than 10 million. 3.over 23 million. 4.over 100 million. 5.Not sure In the U.S., the number of managers that rely on Information.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Randy Beavers CS 585 – Computer Security February 19, 2009.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Cybersecurity for UAS Systems System-Aware Cybersecurity Barry Horowitz University of Virginia November 2015.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Outcomes of the Namibia Water investment Conference Mr Abraham Nehemia Under Secretary for Water Affairs and Forestry 14 September 2012 Ministry of Agriculture,
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Figure 1. Current Threat Landscape Sentiment From: ESG Research Report: Cyber Supply Chain Security Revisited. Source: Enterprise Strategy Group, 2015.
Figure 1. Current Threat Landscape Sentiment
Cybersecurity: Risk Management
Cyber defense management
8 Building Blocks of National Cyber Strategies
NRC Cyber Security Regulatory Overview
Emergency Planning Steps
An Urgent National Imperative
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Engineering Autonomy Mr. Robert Gold Director, Engineering Enterprise
2 OVERVIEW Cybersecurity initiative launched in July 2015 to create a trusted environment to address Cybersecurity -- Focus on the security needs of operators.
Cybersecurity ATD technical
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Challenges Of Network Security
Presentation transcript:

Cybersecurity for Computer- Controlled Physical Systems System-Aware Cybersecurity Barry Horowitz University of Virginia September

A Fast-moving Merger : Advanced Automation, the Internet (of Things), Physical Systems Significant Investments in Innovation: – Autonomy: UAV’s, Cars, Robots – Manufacturing: Additive Manufacturing, Digital Factory, Robots – Advanced Logistics: Use-based Maintenance, 3D Printing But relatively little investment in the associated cybersecurity 2

Two Different Outlooks Regarding Addressing Cybersecurity – Too early in the innovation cycle to bog things down with security considerations – do it later – Factor security considerations into the design process from the start– Less effective and more costly to do security strap-ons after the new system is designed 3

Traditional Cybersecurity for Internet-based Information Systems Standard cybersecurity approaches are infrastructural in nature: Network protections/System perimeter protections Little emphasis on protecting applications within specific information systems – Considered as too expensive – Too many unique systems and apps to practically deal with – Change too fast – Too big, distributed and complex – Too many suppliers and variable quality – Solutions impact user friendliness – Costs of financial losses can be absorbed by spreading over large user bases As a result, the cybersecurity community does not have experience in securing system functions, especially physical system control functions And system designers do not have experience with designing for better cybersecurity, especially physical system designers 4

UVa’s System-Aware Cybersecurity for Computer-Controlled Physical Systems Added layer of security to protect physical system control functions Monitoring the highest risk system functions for illogical behavior and, upon detection, reconfiguring for continuous operation Build on cybersecurity, fault tolerant and automatic control technologies Monitoring/reconfiguring accomplished through a highly secured Sentinel – employ many more security features for protecting the Sentinel than the system being protected can practically employ Addresses not only network-based attacks, but also insider and supply chain attacks Reusable design patterns to enable more economical solution development 5

High Level Architectural Overview System to be Protected + Diverse Redundancy Sentinel Providing System-Aware Security Internal Measurements Outputs Internal Controls “Super Secure” Reconfiguration Controls 6

Early Experience with Multiple Prototypes DoD – UAV/Surveillance system, including in-flight evaluation – Currently employed AF/Army AIMES video exploitation system – Radar system (In early design phase) – Laboratory-based multi-sensor collection system 3d Printers – NIST Ship physical plant control - Northrop Automobile cybersecurity – DARPA Urban Challenge autonomous vehicle 7

Important Factors Regarding Securing Physical Systems Attack possibilities for physical systems are more contained than for information systems – More limited access to physical controls – Fewer system functions – Less distributed – Bounded by laws of physics – Less SW But – Successful attacks can do physical harm – Reconfiguration requires operational procedures for rapid response – Solutions requires confident operators who are trained to react to unprecedented cyber attack events – Physical system operators have no experience or expectations regarding physical system attacks, although demos are coming out of the woodwork – Attacks requiring situation awareness add new dimensions that attackers need to address 8

Important Factors Regarding Securing Physical Systems Attack possibilities for physical systems are more contained than for information systems – More limited access to physical controls – Fewer system functions – Less distributed – Bounded by laws of physics – Less SW But – Successful attacks can do physical harm – Reconfiguration requires operational procedures for rapid response – Solutions requires confident operators who are trained to react to unprecedented cyber attack events – We have no experience or expectations regarding physical system attacks, although demos are coming out of the woodwork – Attacks requiring situation awareness add new dimensions that attackers need to address And Design of solutions requires knowledge of electro-mechanical systems and cybersecurity – significant Workforce and Education issues 9

Virginia State Police Project FOR IMMEDIATE RELEASE Date: May 15, 2015 Commonwealth of Virginia – Office of Governor Terry McAuliffe Office of the Governor Governor McAuliffe Announces Initiative to Protect Against Cybersecurity Threats RICHMOND – Governor Terry McAuliffe announced today that the Commonwealth of Virginia is establishing a public-private working group to explore the technology needed to safeguard Virginia’s citizens and public safety agencies from cybersecurity attacks targeting automobiles. 10

Virginia State Police Project FOR IMMEDIATE RELEASE Date: May 15, 2015 Commonwealth of Virginia – Office of Governor Terry McAuliffe Office of the Governor Governor McAuliffe Announces Initiative to Protect Against Cybersecurity Threats RICHMOND – Governor Terry McAuliffe announced today that the Commonwealth of Virginia is establishing a public-private working group to explore the technology needed to safeguard Virginia’s citizens and public safety agencies from cybersecurity attacks targeting automobiles. Police Lead – Captain Jerry Davis 11

Participating Partners ….and in coordination with: Virginia State Police Cybersecurity For Law Enforcement

Two Virginia State Police Cybersecurity Requirements Need to be able, at the scene of an automobile incident, to assess possibility of a cyber attack as the cause – Indication of electronic tampering to enable cyber attacks – Data collection from the damaged auto and supporting analysis tools Need to secure police vehicles against cyber attacks – Less automation features – Private communications network – More likely target for attack 13

Two Virginia State Police Cybersecurity Requirements Need to be able, at the scene of an automobile incident, to assess possibility of a cyber attack as the cause – Physical indicators – Data collection from the auto and supporting analysis tools Need to secure police vehicles against cyber attacks – Less automation features – Private communications network – More likely target for attack Less vulnerability Greater risk 14

Guiding Principles for the Project The suggested sequence for addressing needs for police organizations: 1.Increase awareness and training regarding the emerging risks 2.As possible, develop early responses that can be put into practice to reduce risks 3.Illuminate manageable next steps that help police forces to collect information about actual cyber attacks, as they emerge 4.Based on the reality and specifics of attacks, inspire rapid implementation of D3 responses (Deter, Detect, Defend) 15

Project Objectives Explore potential attacks against 2 different police vehicles – Ford Taurus, Chevy Impala Explore possible techniques for detecting attacks Explore possible attack defense techniques Develop potential immediate steps for reducing risks of cyber attacks Recommend next steps for risk reduction 16

Project Plan Develop attacks against each of the cars Develop solution concepts regarding such attacks Conduct a live controlled exercise involving unsuspecting police to validate the potential effectiveness of the developed attacks for disrupting operations Use video recordings of the exercise as an initial basis for training Use exercise outcomes to start initiating involvement of the broader community that needs to respond to this emerging risk 17

Project Plan Develop attacks against each of the cars Develop solution concepts regarding such attacks Conduct a live controlled exercise involving unsuspecting police to validate the potential effectiveness of the developed attacks to disrupt operations – Occurred on September 21st Use video recordings of the exercise as an initial basis for training Use exercise outcomes to start initiating involvement of the broader community that needs to respond to this emerging risk 18

September 21 st Exercise Videos 19

Initial Outcomes None of the 4 drivers suspected a cyber attack – A simple driver inspection under the dash board would have revealed the connected electronics that enabled the attacks – One driver suspected an electronic system failure – Another driver suspected that he did not correctly carry out a normally required physical control action All of the drivers appeared to be bewildered by what happened In all cases, the call for a replacement car would likely result in a failure to provide a timely response to the original dispatch call 20

Working Group Recommendations Based Upon Exercise Outcomes Immediate Steps: Reduce risk of attacks that involve tampering/insertion of electronics into cars – Awareness video under development – Inspection procedures need to be developed Need to initiate interactions between auto industry, cybersecurity community and law enforcement communities regarding technical need for rapid implementations regarding extraction of data to support post-attack police detection of cyber attacks Need research programs to develop technology-based defensive solutions so as to enable rapid implementation opportunities should attacks start to emerge 21

Move to Live Demonstration in Parking Lot 22