safety critical
play

Safety-critical Nick Kofinas Devices The Stuxnet Worm(s) Most of - PowerPoint PPT Presentation

How everything can be hacked Safety-critical Nick Kofinas Devices The Stuxnet Worm(s) Most of the following are Maybes Main target: Iranian nuclear program Main physical targets Centrifuge devices PLC controllers The


  1. How everything can be hacked Safety-critical Nick Kofinas Devices

  2. The Stuxnet Worm(s) • Most of the following are “Maybes” • Main target: Iranian nuclear program • Main physical targets • Centrifuge devices • PLC controllers

  3. The Stuxnet Worm(s) • Two actual versions of the Worm • First: sabotage over time • Second: brutal sabotage • Most infected computers in Iran • Very sophisticated worm

  4. First variant • Only official report is in the article on “Foreign Policy” • Designed specifications: • Manual installation • Damage over time • Remain undetected

  5. Second variant • Spread everywhere • Designed specifications: • Copy itself • Immediate sabotage

  6. How it works http://en.wikipedia.org/wiki/Stuxnet

  7. How it works • 4 zero-day vulnerabilities • All of them on windows • Tries to locate step-7 • Copy itself 3 times

  8. Who build it? • Sort answer: No one knows • Zero-day vulnerability = thousand of $ • Probably US or Israel

  9. Is their anything safe? • Stuxnet showed that everything can be hacked • Era of internet of things • What can an external attacker control? • (Sort answer: everything if he has money)

  10. What about our cars? • New car models have more and more cool “stuff” • ABS, ASP, DRL are standard to all models • Radio • Bluetooth • Navigation • Emergency assistance • A lot more

  11. Main bus • All devices connected to a single bus • Cars’ “brain” also in the same bus • Remote I/O for some devices • Bluetooth • Connectivity to iPod/iPhone • Remote assistance

  12. An example http://blog.caranddriver.com/hacking-duo-explores-scary-potential-for-wireless-car-hacking-names-most-and-least-hackable-cars/

  13. Examples • “Direct attacks” • OBD-II port • Hacked into the equipment • Gain control of a PC into the service area

  14. Examples • Remote attacks • Malware wav file into CD • Overflow buffers of the Bluetooth implementation • Overflow buffers of the Remote assistance • Overflow buffers of the iPod connectivity device

  15. Lessons Learned • If some students can do that then the problem is serious • Most of the fixes were straightforward • Most of the bugs were in Glue Code

  16. What about Pacemakers • Pacemakers help patients to have a normal life • Older models required surgery to be reprogrammed • Newer ones capable of remote reprogramming

  17. What can go wrong? • An attacker can take full control of it • Aquire personal information • Change the behavior of the pacemaker • Initiate fatal accident

  18. Remote access protection • Common solution: Passwords • What problems can you think? • Ideas to solve these problems?

  19. Proposed Solutions Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices

  20. Interviews • Interviewed 11 people • None of the solutions where favored • They provide interesting counter-ideas “I’m not gonna-, I think it’s ridiculous to worry about the security of it...Anybody that wants to • get to me that bad, be my guest.”

  21. Conclusion • Security against hacking is difficult • Programmers of sensitive devises must be careful

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend