elc 2013 security best practices for embedded systems
play

ELC 2013 Security: Best Practices for Embedded Systems John - PowerPoint PPT Presentation

ELC 2013 Security: Best Practices for Embedded Systems John Mehaffey Senior System Architect Embedded Systems Division mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux


  1. ELC 2013 Security: Best Practices for Embedded Systems John Mehaffey Senior System Architect Embedded Systems Division mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

  2. About Me • Mobilinux Architect for MontaVista • Automotive Architect for MontaVista • Security Lead for GENIVI System Infrastructure Expert Group • Senior System Architect for Mentor Embedded 2

  3. Overview Embedded system, not IT system • • Physical security is NOT possible You do not own the device! • • It’s not Fort Knox If you ARE protecting FK (e.g. ATM), you need to go through • MUCH more than is presented here Common Criteria • Hackers are generally lazy • • Don’t be “Low Hanging Fruit” 3

  4. You Don’t Have to Outrun the Bear! 4

  5. Black Hats Script Kiddies • Opportunists • • Insiders • Bots • Grudge hackers Organized • • “Hacktivist” • Organized Crime • Nation States (Government) 5

  6. Design Best Practices Root of trust • • Secure boot • OTP • Hardware Assisted Security Harden your hardware • • Reduce Electromagnetic Emissions • Limit access to Hardware Potting • • Hardware crypto module • Be wary of GPLv3 Update mechanism may need to accept unverified code • OTP “modified” flag inside crypto module • 6

  7. Design Best Practices (continued) Linux Security Modules • • Design it in from the start • SELinux Most Complete, hardest to configure • • AppArmor Path Based • • SMACK “Simplified” • • Many more … Plan for field updates • • Push vs Pull 7

  8. Protect your Data Data at rest • • Ecryptfs • Data in motion • SSL, TLS • IPsec 8

  9. Development Best Practices Code Reviews • Comments! • Coding Standards • Simplicity • • “Constructs in programming languages that are difficult to use properly can be a large source of vulnerabilities” • Randomize! • PAX patches (ASLR, etc) • Keep your entropy up Enroll your IRQs • Haveged • 9

  10. Static Analysis Tools Compiler • • Wformat, Wformat-security, Wall, Werror, Wpedantic • fstack-protector, fstack-protector-all • D_FORTIFY_SOURCE=2 http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis • • Lint, Jlint, Splint, PyLint, … • Abash, Boon, Clang, Oink, RATS, UNO, Yasco, … • Black Duck, Coverity, Klocwork, Rational, … 10

  11. Testing Best Practices QA Plan • Test error paths! • Coverage analysis • • gcov 11

  12. Dynamic Analysis Tools Dmalloc, Electric Fence, mtrace, mpatrol, … • Valgrind, … • Avalanche, Glassbox, gperftools, jrat, … • Purify, Rational, … • 12

  13. Pre-Deployment Best Practices Close your ports • Limit access as much as possible • Don’t assume obscurity will protect you • Run hacker tools • • nmap • Metasploit/Armitage • John the Ripper • ……….. Hire a professional for evaluation! • • Penetration test 13

  14. Obscurity is not a defense This month (Feb 2013), security researchers found a critical vulnerability in the Tridium Niagara Industrial control system, allowing hackers to obtain administrator logins and passwords. The system is widely used by the military, hospitals and factories to control surveillance, alarms, door locks, … Last year, the company said it believed attacks on its systems were unlikely because the systems were obscure and hackers . 14

  15. Post-Deployment Best Practices Perfection is not possible • • Follow the lists • Deploy fixes 15

  16. The Attacks Timing attacks • Fault Attacks • Power Analysis • Port Scans • DoS • Escalation of privilege • • rootkits 16

  17. The Defense Timing attacks • • Randomize • Fault Attacks • Code review, test Power Analysis • • Randomize inside Crypto module Port Scans • • Close them DoS • • Limit resource usage (cgroups) • Escalation of Privilege • MAC 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend