CYBER-PHYSICAL SYSTEMS
Constantinos Xenofontos cxenof02@ucy.ac.cy
CYBER-PHYSICAL SYSTEMS Constantinos Xenofontos cxenof02@ucy.ac.cy - - PowerPoint PPT Presentation
CYBER-PHYSICAL SYSTEMS Constantinos Xenofontos cxenof02@ucy.ac.cy BEFORE WE START... Security not always means web or mobile etc. What are the Cyber-Physical
Constantinos Xenofontos cxenof02@ucy.ac.cy
2
FLAVIO D. GARCIA, DAVID OSWALD, TIMO KASPER AND PIERRE PAVLIDÈS
UNIVERSITY OF BIRMINGHAM, UK KASPER AND OSWALD ,GERMANY
3
manufacturers.
well.
4
Two main components: Immobilizer
Remote Key Entry (RKE)
5
6
Define Radios (SDR)
(ASK)
Encoding
7
8
9
and 2016
(VW-1…VW-4)
10
Step 1: Eavesdropping & decoding Step 2: Reverse-engineering ECUs assembly (Dump ECU firmware)
11
12
13
single rolling code
14
15
16
➢ 20-bits are put through function → 1 –bit key stream ➢ Feedback polynomial used to generate new bit on right of LSFR
17
REQUIREMENTS:
➢ 4 – 8 button presses ➢ Arduino setup (as it is used previously) ➢ Implement reactive jamming ➢ Speeding up trace collection
18
(takes 4-8 button presses to crack)
19
schemes over than 20 years.
VW Group for their findings in back in December 2015 and NXP Semiconductors in January 2016.
necessary equipment to receive and send rolling codes, are low cost so eavesdropping and cloning are easier.
vehicles.
forced entry.
20
DAVIDE QUARTA, MARCELLO POGLIANI, MARIO POLINO, FEDERICO MAGGI, ANDREA MARIA ZANCHETTIN AND STEFANO ZANERO
POLITECNICO DI MILANO, ITALY TREND MICRO INC.
21
cyber attacks against industrial robots
22
robot units will be employed in factories globally
23
24
Industrial robots are exposed often interconnected to the
these due to the fact that they need to be really flexible just to make the production be more efficient.
25
Preliminary investigation: Authors sent a survey to 50 domain experts from the academia and the industry. (including representatives of relevant scientific and technical societies) ~ avg. 20 answers
RESULTS: ➢ 28% users not enforced access control policies ➢ 30% robots directly accessible over the internet ➢ 76% users never perform vulnerability assessment ➢ More than 50% did not think that cyberattack was a realistic threat on industrial robots
26
exposing robots to cyberattacks
(confirmed by both a small scale survey undertaken by the authors, and the shocking state of security in practice)
27
*Attacker has technical capabilities and access to equipment of course.
28
29
30
31
32
33
34
35
impact robot movements
36
37
38
39