Cybersecurity for UAS Systems System-Aware Cybersecurity Barry Horowitz University of Virginia November 2015.

Slides:



Advertisements
Similar presentations
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Advertisements

Note: Lists provided by the Conference Board of Canada
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
DARPA ITS PI Meeting – Honolulu – July 17-21, 2000Slide 1 Aegis Research Corporation Intrusion Tolerance Using Masking, Redundancy and Dispersion DARPA.
System Aware Cyber Security NDIA Barry Horowitz University of Virginia February, Sponsor: DoD, through the Stevens Institute”s SE Research Center.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
5 december 2011 Living Probabilistic Asset Management Dr.ir. J.A. van den Bogaard.
Systems Engineering in a System of Systems Context
Fundamentals of Information Systems, Second Edition
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
Enterprise Architecture
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
CSCE 548 Secure Software Development Risk-Based Security Testing.
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
Information Systems Security Computer System Life Cycle Security.
Systems and Information Engineering: Departmental Overview.
NIST Special Publication Revision 1
CSCE 548 Secure Software Development Test 1 Review.
Secure Societies 2014 Working programme University of ULSTER (UU), United Kingdom University of ULSTER (UU), United Kingdom Prof. Hui Wang, Dr. Jun Liu,
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety Believe it or.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
System-Aware Cyber Security Architecture Rick A. Jones October, 2011.
Johann Schumann and Pramod Gupta NASA Ames Research Center Bayesian Verification & Validation tools.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
CSCE 522 Secure Software Development Best Practices.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Chapter 6 CASE Tools Software Engineering Chapter 6-- CASE TOOLS
CSCE 548 Secure Software Development Security Operations.
Multiagent System Katia P. Sycara 일반대학원 GE 랩 성연식.
CSCE 201 Secure Software Development Best Practices.
Cybersecurity for Computer- Controlled Physical Systems System-Aware Cybersecurity Barry Horowitz University of Virginia September
SecSDLC Chapter 2.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Census Processing Baku Training Module.  Discuss:  Processing Strategies  Processing operations  Quality Assurance for processing  Technology Issues.
Session 1.31 RISK BASED AUDITING AN OVERVIEW BY R T I JAIPUR.
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
Organisation Development(OD)
ESA Harwell Robotics & Autonomy Facility Study Workshop Autonomous Software Verification Presented By: Rick Blake.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
GRC: Aligning Policy, Risk and Compliance
“AIRborne information for Emergency situation Awareness and Monitoring” AIRBEAM Project Kaci Bourdache.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Collaboration Process 1. IC Objectives and Risk Tolerances Define, document, and implement top-down internal control objectives and risk tolerances: 
Cybersecurity of Smart City Technologies Assessing the Security, Interoperability and Governance Issues Angelos Stavrou, J.P. Auffret, Dan Fleck and Constantinos.
Part III: The Future: Scenarios, Conclusions, and Recommendations [of HSI Methods in System Development] Frank E. Ritter 26 feb 08 1.
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
Supportability Design Considerations
Security Testing Methods
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Detection and Analysis of Threats to the Energy Sector (DATES)
CSCE 548 Secure Software Development Test 1 Review
Cybersecurity EXERCISE (CE) ATD Scenario intro
Quality Risk Management
Cyber defense management
Quality management standards
SCSC April 2018 A model for including cyber threat in safety cases
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
An Urgent National Imperative
Cybersecurity ATD technical
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Presentation transcript:

Cybersecurity for UAS Systems System-Aware Cybersecurity Barry Horowitz University of Virginia November 2015

Three Aspects to Cybersec for UAS’s Securing the manufacturing of the system Securing the final product Securing the final product in the context of the integrated air/ground system

A Systems Engineering View Because cybersec for UAS’s: – Impacts safety (Policy) – Requires operational doctrine to effectively respond to attacks (Process) – Requires solutions that span a broad array of risks (Technology) System-oriented research efforts are needed to develop solutions that account for the mix of: – Technology opportunities and limitations – Policy objectives – Process Issues (including human factors)

Traditional Cybersecurity for Internet-based Information Systems Standard cybersecurity approaches are infrastructural in nature: Network protections/System perimeter protections Little emphasis on protecting applications within specific information systems As a result, the cybersecurity community does not have needed experience in securing applications, and in particular physical system control functions And physical system designers do not have needed experience with designing for better cybersecurity

UVa’s System-Aware Cybersecurity for Computer-Controlled Physical Systems (1 of 2) Added layer of security, in addition to network and perimeter security, to protect physical system control functions Monitoring the highest risk system functions for illogical behavior and, upon detection, reconfiguring for continuous operation Build on cybersecurity, fault tolerant and automatic control technologies System monitoring/reconfiguring accomplished with support from a highly secured Sentinel – employ many more security features for protecting the Sentinel than the system being protected can practically employ

UVa’s System-Aware Cybersecurity for Computer-Controlled Physical Systems (2 of 2) Addresses not only externally generated attacks, but also insider and supply chain attacks Employs reusable design patterns to enable more economical solution development Includes doctrine for operator response to detected attacks Includes integrated methodology and tools developed to support assessment of both the consequences of attacks and the impact of potential defenses on the cyber attacker’s potential selection of attacks – Use SysMl for sufficiently detailed description of system to be protected – Use Attack Trees to support a two-sided assessment methodology

High Level Architectural Overview System to be Protected + Diverse Redundancy Sentinel Providing System-Aware Security Internal Measurements Outputs Internal Controls “Super Secure” Reconfiguration Controls

Sample of Reusable Design Patterns Being Prototyped Diverse Redundancy for post-attack restoration Diverse Redundancy + Verifiable Voting for trans-attack attack deflection Physical Configuration Hopping for moving target defense Data Consistency Checking for data integrity and operator display protection Parameter Assurance for parameter controlled SW functions Conditional Disablement of automation features Doctrinal Assurance Checking for critical decisions

UAV Prototype Live flight tests in December 2014 at Early County Airport in Blakely Georgia Multiple attacks/detections/responses – Waypoint changes – Camera pointing control – GPS navigation errors – Meta data to support video interpretation Secure Sentinel, including: – Triple diverse redundancy – Computer HW/Operating Systems/ Monitoring SW for monitoring – Configuration hopping – Monitoring both the airborne and ground-based subsystems for continuity Accomplished within power, cooling and physical footprint of an Outlaw UAV carrying video cameras and small phased array radar (currently implemented within a 3”cube

UAV Video

Continuing to Learn through Multiple Prototype Projects DoD – UAV/Surveillance system, including in-flight evaluation – Creech AF Base human factors exercise – Currently employed AF/Army AIMES video exploitation system – Radar system (In early design phase) – Initiating Army tank project related to advanced fire control system – Laboratory-based multi-sensor collection system 3d Printers – NIST Automobile cybersecurity – DARPA Urban Challenge autonomous vehicle – Virginia State Police project

Important Factors Regarding Securing Physical Systems Monitoring for and responding to attacks that have gained control of physical systems is a more contained objective than for information systems – More limited access to physical controls – Fewer system functions – Less distributed – Bounded by laws of physics – Less SW But – Successful attacks can do physical harm – Reconfiguration requires operational procedures for rapid response – Solutions requires operators who are trained and ready to react to very infrequent and unprecedented (zero day) cyber attack events – Physical system operators have no experience or expectations regarding physical system attacks, and – When selecting attacks to defend agains, need to be careful when building on historic safety related analyses - multiple concurrent failures, considered as independent and acceptably rare from a safety viewpoint, can be purposefully accomplished as part of a cyber attack (e.g., Stuxnet)

Scope of System-Aware Research Activities Human Factors – Working with AF Human Factors community at Wright Pat exploring “suspicion” as a measurable human characteristic, and how it relates to behavior in cyber attack situations and response to Sentinel information Methodology for selection of physical system functions to protect, based upon: – Operational risk-based prioritization – Dependable SysMl system descriptions – Integrated SysMl descriptions/ Attack Tree tools for red team participation – Penetration testing System-of-Systems based, mission-level security considerations governing widget level security implementation decisions – Currently using a laboratory environment (emulated base defense system) to address solution requirements and doctrine

System Aware Cyber Security Publications JOURNAL ARTICLES: B. M. Horowitz, R.A. Jones, Smart security sentinels for providing cybersecurity for critical system functions: unmanned aerial vehicle case study, Journal of Aerospace Operations, (Under review) R. A. Jones, B. Luckett, P. Beling, B. M. Horowitz, Architectural Scoring Framework for the Creation and Evaluation of System-Aware Cyber Security Solutions, Journal of Environmental Systems and Decisions 33, no. 3 (2013): B. M. Horowtiz and K. M. Pierce, The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems, Systems Engineering, vol 16, Issue 4 (2013): R. A. Jones and B. M. Horowitz, A system-aware cyber security architecture, Systems Engineering, Volume 15, No. 2 (2012), J. L. Bayuk and B. M. Horowitz, An architectural systems engineering methodology for addressing cyber security, Systems Engineering 14 (2011), REFEREED CONFERENCE ARTICLES G. L. Babineau, R. A. Jones, and B. M. Horowitz, A system-aware cyber security method for shipboard control systems with a method described to evaluate cyber security solutions, 2012 IEEE International Conference on Technologies for Homeland Security (HST), R.A. Jones, T.V. Nguyen, and B.M. Horowitz, System-Aware security for nuclear power systems, 2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011, pp

Patent Related Activity US Patent Application – US Patent App No. 14/660,278: “Cyber-Physical System Defense” Provisional Patents – US Prov. No. 61/955,669: “Cloud Based System Aware Cybersecurity and Related Methods Thereof” – US Prov. No. 62/075,179: “System Aware Cybersecurity and Related Methods Thereof” In Preparation – Additive Manufacturing (3D Printer) Cyber Security