Presentation is loading. Please wait.

Presentation is loading. Please wait.

Weaponizing IoT Ted Harrington Executive Partner

Similar presentations


Presentation on theme: "Weaponizing IoT Ted Harrington Executive Partner"— Presentation transcript:

1 Weaponizing IoT Ted Harrington Executive Partner
SBX2-W2 Weaponizing IoT Ted Harrington Executive Partner Independent Security Evaluators (ISE) @ISESecurity

2 Weaponize wep-uh-nahyz
1) To convert to use as a weapon 2) To supply or equip with weapons Purpose of this slide is to define the key title term and overall presentation theme. Set the groundwork for the disucssion about how IoT can and is weaponized. Rest of the presentation ties back to this concept.

3 Agenda Overview Common IoT exploits Case Study Victim Chain Prophecies
Recommendations

4 Overview Purpose of this slide is to establish credibility and set context. Very briefly introduce ISE’s research contributions, in particular as it pertains to IoT via IoT Village

5 Overview Purpose of this slide is to introduce IoT Village, from which data and other themes are extracted in support of the argument made during the rest of this presentation. Mention here that IoT Village is why RSA has asked us to organize IoT Sandbox

6 Trends & Data

7 IoT Security Trends August 2015 – Present: 113 new 0-days
50 device types 39 manufacturers Discuss metrics in order to analyze an quantify the scope of the IoT security problem

8 Common IoT Security Flaws
2016 2017 Denial of Service Lack of Encryption Key Exposure Privilege Escalation Remote Code Execution Backdoors Runs as Root All of the previous!! PLUS: Buffer Overflow Command Injection Session Management Etc etc etc Describe that things are trending worse, not better. Outline the types of issues relevant to IoT, setting up for a deeper dive into some of the more significant items

9 Exploit Analysis

10 Key Exposure Define what this vulnerability means, how it generally works in the context of IoT, and extrapolate the significance.

11 Remote Code Execution Define what this vulnerability means, how it generally works in the context of IoT, and extrapolate the significance.

12 Command Injection Define what this vulnerability means, how it generally works in the context of IoT, and extrapolate the significance.

13 Case Study: Mirai Botnet
Advance the talk now from the generalized concepts discussed previously to a real-world, high profile incident

14 Mirai Botnet Give context and background, for those who might be unfamiliar with the Mirai botnet story

15 Mirai Botnet Break down the attack anatomy

16 Mirai Botnet Break down the attack anatomy

17 WHO CARES?! Score some cheap laughs, then really ask the question. Set up for a discussion of who the victims are and why they might (or might not) care, and how that motivation would dictate whether the problem gets solved

18 Victim Chain Discuss each victim type, what they care about, and how that impacts the ultimate victim

19 Where do we go from here?

20 Recommendations Threat Modeling Secure Design Principles
Adversarial Perspective Self-regulate Talk through each recommendation, one by one

21 Prophecies It will get worse before it gets better
The 10/16/16 event was covering something larger A person(s) will get hurt physically

22 Apply Consider motivation Think like the attacker
Adhere to secure design principles

23 Thank You!


Download ppt "Weaponizing IoT Ted Harrington Executive Partner"

Similar presentations


Ads by Google