identification of authenticity requirements in systems of
play

Identification of Authenticity Requirements in Systems of Systems by - PowerPoint PPT Presentation

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for Secure Information Technology SIT,


  1. Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany Jun 2009 Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 1 / 16

  2. Overview Motivation 1 Scenario - cooperative reasoning in vehicular ad hoc communication Dependence of safety critical decisions raises security concerns Objectives 2 Systematic security requirements elicitation for novel architectures Avoid premature architecture constraints Functional Security Analysis 3 4 Results and Outlook Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 2 / 16

  3. Why think about new vehicular Architecture using SoS reasoning overall goal reduce number and impact of accidents in Europe difficulties to improve safety measures in vehicles � improve infrastructure cooperative approach ⇒ warning ⇒ vehicular communication systems can be more effective in avoiding accidents and traffic congestion than current technologies where each vehicle tries to solve these problems individually Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 3 / 16

  4. Use case: send danger warning sense(ESP,SlipperyWheels) receive(CU,danger(position,type)) positioning(GPS,position) positioning(GPS,position) → send(CU,danger(position,type)) show(HMI,D,warn(relative-position)) ESP - Electronic Stability Protection HMI - Human Machine Interface GPS - Global Positioning System D - Driver CU - CommunicationUnit Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 4 / 16

  5. Security is an enabling Technology for novel SoS Applications Exposing vehicles to the Internet makes them vulnerable Attacks on safety Manipulate traffic flow ◮ Unauthorized brake ◮ Simulate traffic jam for target ◮ Attack active brake function vehicle ◮ Tamper with warning message ◮ Force green lights ahead of attacker − → ◮ Attacking E-Call ◮ Manipulate speed limits ◮ On-Board Diagnostics (OBD) ◮ Prevent driver from passing flashing attack toll gate ◮ Engine refuses to start Attacks on privacy Increase/Reduce driver’s toll bill ◮ Trace vehicle movement ◮ Compromise driver privacy Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 5 / 16

  6. Security Requirements Engineering Process the identification of the target of evaluation and the principal security goals and the elicitation of artifacts (e.g. use case and threat scenarios) as well as risk assessment the actual security requirements elicitation process a requirements categorisation and prioritisation, followed by requirements inspection Further steps in Security Engineering security requirements (structural) refinement mapping of security requirements to security mechanisms Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 6 / 16

  7. Methods to elicit security requirements misuse cases (attack analysis), anti-goals derived from negated security goals, use Jackson‘s problem diagrams, actor dependency analysis ( i ∗ approach) Why yet another approach ? Completeness Avoid premature architecture constraints protocols SSL/TLS/VPN/IPv6 trust anchor TPM infrastructure PKI, PDP/PEP end-to-end/hop-by-hop Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 7 / 16

  8. Functional Component Model ⇒ ⇒ Vehicle-Component send(CU,danger(pos,type)) sense(ESP,SlipWheels) positioning(GPS,pos) show(HMI,D,warn(relpos)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) Security goal of the system at stake: Whenever a certain output action happens, the input action that presumably led to it must actually have happened. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 8 / 16

  9. Functional Component Model ⇒ ⇒ Vehicle-Component send(CU,danger(pos,type)) sense(ESP,SlipWheels) positioning(GPS,pos) show(HMI,D,warn(relpos)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) Security goal of the system at stake: Whenever a certain output action happens, the input action that presumably led to it must actually have happened. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 8 / 16

  10. Functional security requirement identification Vehicle 0 Vehicle w send(CU,danger(pos,type)) send(CU,danger(pos,type)) sense(ESP,SlipWheels) sense(ESP,SlipWheels) positioning(GPS,pos) positioning(GPS,pos) show(HMI,D,warn(relpos)) show(HMI,D,warn(relpos)) forward(CU,danger(pos,type)) rec(CU,danger(pos,type)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) Formally, the functional flow among actions can be interpreted as an ordering relation ζ i on the set of actions Σ i in a certain system instance i . ζ 1 = { ( positioning ( GPS w , pos ) , show ( HMI w , D w , warn ( relpos ))) , ( rec ( CU w , danger ( pos , type )) , show ( HMI w , D w , warn ( relpos ))) , ( send ( CU 0 , danger ( pos , type )) , rec ( CU w , danger ( pos , type ))) , ( sense ( ESP 0 , SlipWheels ) , send ( CU 0 , danger ( pos , type ))) , ( positioning ( GPS 0 , pos ) , send ( CU 0 , danger ( pos , type ))) } Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 9 / 16

  11. Functional security requirement identification Vehicle 0 Vehicle w send(CU,danger(pos,type)) send(CU,danger(pos,type)) sense(ESP,SlipWheels) sense(ESP,SlipWheels) positioning(GPS,pos) positioning(GPS,pos) show(HMI,D,warn(relpos)) show(HMI,D,warn(relpos)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) forward(CU,danger(pos,type)) rec(CU,danger(pos,type)) Restrict ζ ∗ i to outgoing ( max i ) and incoming boundary actions ( min i ). χ i = { ( x , y ) ∈ Σ i × Σ i | ( x , y ) ∈ ζ ∗ i ∧ x ∈ min i ∧ y ∈ max i } χ 1 = { ( sense ( ESP 0 , SlipWheels ) , show ( HMI w , D w , warn ( relpos ))) , ( positioning ( GPS 0 , pos ) , show ( HMI w , D w , warn ( relpos ))) , ( positioning ( GPS w , pos ) , show ( HMI w , D w , warn ( relpos ))) } For all x , y ∈ Σ i with ( x , y ) ∈ χ i : auth ( x , y , stakeholder ( y )) is a requirement. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 9 / 16

  12. Resulting Authenticity Requirements For all possible SoS instances for the action show ( HMI w , D w , warn ( relpos )) it must be authentic for the driver that: auth ( positioning ( GPS w , pos ) , show ( HMI w , D w , warn ( relpos )) , D w ) 1 the relative position of the danger she is warned about is based on correct position information of her vehicle auth ( positioning ( GPS 0 , pos ) , show ( HMI w , D w , warn ( relpos )) , D w ) 2 the position of the danger she is warned about is based on correct position information of the vehicle issuing the warning auth ( sense ( ESP 0 , SlipWheels ) , show ( HMI w , D w , warn ( relpos )) , D w ) 3 the danger she is warned about is based on correct sensor data Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 10 / 16

  13. System of Systems Instances Vehicle 0 Vehicle w send(CU,danger(pos,type)) send(CU,danger(pos,type)) sense(ESP,SlipWheels) sense(ESP,SlipWheels) positioning(GPS,pos) positioning(GPS,pos) show(HMI,D,warn(relpos)) show(HMI,D,warn(relpos)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) rec(CU,danger(pos,type)) forward(CU,danger(pos,type)) Vehicle 1 Vehicle 2 send(CU,danger(pos,type)) sense(ESP,SlipWheels) send(CU,danger(pos,type)) sense(ESP,SlipWheels) positioning(GPS,pos) positioning(GPS,pos) show(HMI,D,warn(relpos)) show(HMI,D,warn(relpos)) forward(CU,danger(pos,type)) forward(CU,danger(pos,type)) rec(CU,danger(pos,type)) rec(CU,danger(pos,type)) An analysis for the second instance will result in: χ 2 = χ 1 ∪{ ( positioning ( GPS 1 , pos ) , show ( HMI w , D w , warn ( relpos ))) } And the third system of systems instance will result in: χ 3 = χ 2 ∪{ ( positioning ( GPS 2 , pos ) , show ( HMI w , D w , warn ( relpos ))) } χ i = χ i − 1 ∪{ ( positioning ( GPS i − 1 , pos ) , show ( HMI w , D w , warn ( relpos ))) } Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 11 / 16

  14. Resulting Authenticity Requirements For all possible SoS instances for the action show ( HMI w , D w , warn ( relpos )) it must be authentic for the driver that: auth ( positioning ( GPS w , pos ) , show ( HMI w , D w , warn ( relpos )) , D w ) 1 the relative position of the danger she is warned about is based on correct position information of her vehicle auth ( positioning ( GPS 0 , pos ) , show ( HMI w , D w , warn ( relpos )) , D w ) 2 the position of the danger she is warned about is based on correct position information of the vehicle issuing the warning auth ( sense ( ESP 0 , SlipWheels ) , show ( HMI w , D w , warn ( relpos )) , D w ) 3 the danger she is warned about is based on correct sensor data ∀ V x ∈ V forward : 4 auth ( positioning ( GPS x , pos ) , show ( HMI w , D w , warn ( relpos )) , D w ) position of forwarding vehicles is authentic ◮ Breaking (4) would result in a smaller or larger broadcasting area. ◮ This cannot cause the warning of a driver that should not be warned. ◮ So it is NOT a safety related authenticity requirement. Roland Rieke (Fraunhofer SIT) SoS - Functional Security Analysis Jun 2009 12 / 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend