addressing the threats of iot
play

Addressing the threats of IoT Hans de Jong Technology Lead for - PowerPoint PPT Presentation

Addressing the threats of IoT Hans de Jong Technology Lead for Security Innovation & Fellow Head of NXP Product Security Incident Response Team (NXP PSIRT) NXP Semiconductors, Eindhoven # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza


  1. Addressing the threats of IoT Hans de Jong Technology Lead for Security Innovation & Fellow Head of NXP Product Security Incident Response Team (NXP PSIRT) NXP Semiconductors, Eindhoven # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  2. IoT, the upside • Can make life easier and better • Large market opportunity # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  3. IoT, the downside • It will only fly if security and privacy are well taken care of. – Otherwise people will not trust it and not buy it • If security and privacy are not taken care of, IoT can derail society. # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  4. How to get attacked? Logical attacks Physical attacks = rem ote attacks? = local attacks? Make use of Make use of physical software errors in vulnerabilities in the IoT the IoT device device # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  5. How to get attacked? Logical attacks Physical attacks = rem ote attacks? = local attacks? No! Make use of Make use of physical software errors in vulnerabilities in the IoT the IoT device device # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  6. What attacks to protect against? # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  7. What attacks to protect against? Aim to protect against Make a trade-off any local logical attack between investment in if an attacker can have the attack and value to local access. Same reason. be gained / damage (Only needed if attacks can do done (at any point more harm than to the attacker during the lifetime) alone) Aim to protect against any remote attack (logical & physical). Reason: they can be scripted and executed by laymen. # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  8. What to protect • Always protect integrity/ authenticity. • Protect confidentiality when needed (often the case). • Protect availability when needed. • Protect privacy when applicable. • Consider to protect against physical attacks – at least attacks that may give attacker full control over the device. – Boot protection – Lifecycle protection (avoid getting back to debug mode) – Protection of keys – Protection of usage of the keys (access control) # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  9. Three Principles for IoT Security • Protect the device as good as possible / necessary – See previous slides • * Assume it will be compromised during the lifetime.  Make sure there is a way to recover the device. – Without a truck-roll whenever possible. • * Limit the attractiveness of hacking the device, e.g. – Use diversified keys (different keys per device and per purpose): breaking one device does not break the system. – Limit the bandwidth for DNS requests * The last two require a secure anchor in the device. # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  10. Some other principles • Take care of privacy when applicable (look at GDPR!). • Strive to use isolation whenever possible. – Run keys, crypto and essential functions on a different core. • Make sure to be able to remotely update the device. – Plan for enough capabilities (e.g. memory, crypto, processing) during the foreseen lifetime. • As buyer: make sure that a security update service is provided and the support lifetime is stated in the contract. • End of security updates = end of life of the IoT device. • Know the security of what you buy. # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  11. How to know the security of Security certification – WHY? w hat you buy? Product A Product B Product A Product B # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  12. How about IoT? • Is security certification a solution for IoT? • For smartcards (passports, drivers licenses, identity cards, banking cards), there is Common Criteria certification – Security lab evaluates the product for weeks and gives points for any attack found (e.g. for time, knowledge and equipment needed). – Attack with the lowest amount of points determines the security of the product. – When above a threshold, a Certification Body will issue a certificate. • How about IoT devices? – With fast product life cycles. – With many security updates during its life time. # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  13. What does Common Criteria as a standard say? • Certification Body does not necessarily have to be a governmental entity Private Cert Body Public Cert Body What CC allows CC for smartcards • Cert Body does not need to check everything the lab has done in great detail Cert Body Lab Lab Cert Body CC for smartcards What CC allows # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  14. What does Common Criteria as Standard Say? • CC evaluator work units are guidance and not mandatory CC for smartcards What CC allows • No requirements how evidence is provided Interviews / Workshops Very formal documentation CC for smartcards What CC allows # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  15. What does Common Criteria as Standard Say? • No requirements on which development methodology to use Waterfall Approach Agile Approach CC for smartcards What CC allows # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  16. Lean security certification for IoT • CC Certification as applied for smartcards works for smartcards, but will not work for IoT. Expensive, static certification that cannot deal well with product updates. • A lean scheme for IoT can address the above mentioned issues as a Common Criteria based scheme by – Set up of a commercial Certification Body • Run by industry experts with a business understanding when operating – For IoT, keep the product assessment by an independent lab, but let the paradigm of a static “one time assessment only” shift towards assurance via continuous oversight • With a certain degree of freedom for updates • Enabling vendors to perform security updates immediately within approved boundaries • Requiring the vendors to continuously monitor their products and track vulnerabilities • Requiring the evaluator to audit vendor security monitoring processes in certain time frames • Requiring the evaluator to assess updates that are outside of approved boundaries – Reduction of evaluation formalisms and tedious documentation • Reducing efforts at vendors • Reducing efforts at evaluation laboratories on formal aspects # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  17. Should firmware be encrypted? • Local physical attacks are not scalable, but .. – When code can be taken from one device, it can sooner lead to finding remotely exploitable vulnerabilities. – Also consider brand damage and IP theft. • Hence firmware encryption may be good to consider. – Note that the key has to be on the device – So it is obfuscation – Makes attacks more difficult # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  18. Is this promoting security by obscurity? • We subscribe to Kerchhoff’s principle, … • … but Kerchhoff did not consider millions of devices with fixed ROM code in the field which are not updatable. – There always has to be some code in ROM So, where are we exactly? # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  19. Conclusions / Recommendations • Security is essential for making IoT successful while protecting society • Consider remote / local and logical / physical attacks – Some always, some depending on value to protect – Scope: the entire life time of the device • Make sure the device can be updated during its lifetime • Stop using devices when no longer maintained • Let governments and businesses for IoT devices that they buy demand – An update service for security patches – A minimum period that devices will be maintained – Certified devices • A CC certification infrastructure is needed that is appropriate for IoT # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

  20. QUESTIONS? # dSymp dcypher Symposium 2017 | Oct 4th Media Plaza Utrecht | connects cybersecurity knowledge

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend