1
ISOAG Me e ting F e br ua r y 7, 2018
Welcome to CESC
www.vita.virginia.gov
Welcome to CESC www.vita.virginia.gov 1 We lc ome and Ope ning Re - - PowerPoint PPT Presentation
ISOAG Me e ting F e br ua r y 7, 2018 Welcome to CESC www.vita.virginia.gov 1 We lc ome and Ope ning Re mar ks Mic hae l Watson February 7, 2018 www.vita.virginia.gov 2 2 ISOAG F e br uar y 7, 2018 W elcom e & Opening Rem
1
www.vita.virginia.gov
2
www.vita.virginia.gov
2
3
I . W elcom e & Opening Rem arks Mike W atson, VI TA.
I I . Cybersecurity Risk for Autom ated Kevin Heaslip, VT Vehicles in the Com m onw ealth I I I . COV Security Requirem ents 1 0 1 Joy Young, VI TA I V. Upcom ing Events Mike W atson, VI TA
hume@vt.edu www.hume.vt.edu
2/7/2018 5
NSA/DHS Center for Academic Excellence IC Center for Academic Excellence CyberCorps Scholarship for Service Site
a Tech National Security Enterprise
me Center for National curity and Technology Virginia Tech Applied Research Corporation
Collaborative Innovation Technology Domain Awareness Applied R&D Integrated 501(c)3 6.2 through 6.4 ense Workforce Development Advanced Research Breakthrough Technologies University Center 6.1 through 6.3
$18M
Annual Program Revenue
300
Annual Academic Publications
100
Researchers, Staff and Professors
250
Students Engaged Annually
Arlington Blacksburg DOD S&T IC S&T
Industry, Foundations Other Federal
2/7/2018 6 Vice President for Research and Innovation
Hume Center
Office of Finance and Operations Office of Outreach and Education Electronic Systems Laboratory Aerospace Systems Laboratory Information Systems Laboratory
IC Center for Academic Excellence NSF Security and Software Engineering Research Center NSA/DHS CAE for Cyber Defense Research
Operatin g Departm ents National Centers
Charles Clancy Director
ECE
Mark Goodwin Deputy Director Bob McGwier Chief Scientist
ECE, AOE
Christie Thompson Director of Finance and Operations Jon Black Director, Aerospace Systems Lab
AOE, ECE
Alan Michaels Director, Electronic Systems Lab
ECE
Kevin Heaslip Associate Director, Electronic Systems Lab
CEE
Christine Callsen Director of Outreach and Education Kira Gantt Associate Director of Outreach and Education
Academic Appointments
AOE Aerospace and Ocean Engineering CEE Civil and Environmental Engineering ECE Electrical and Computer Engineering
Outreach & Education Electronic Systems Lab Aerospace Systems Lab Information Systems Lab
2/7/2018 7
Assured Communications Radar and Spectrum Electronic and Cyber Warfare Embedded System Security Secure and Resilie Infrastructure Space Situational Awareness Unmanned Platforms National- and Cyber-Security Curriculum Extracurricular Programs Student Career Mentorship Autonomy & Mission Orchestration Applied Deep Learning Cubesats and Small Satellites Counter A2AD Security and Priva for IoT Experiential Learning
Control
Unclonable Functions
Attacks
for SCADA transactions
Exploitation
Management
Assessments
Encryption
Airworthiness Center
Encryption
Security (Transmission and Distribution)
Control Systems
2/7/2018 8
CIKR Security IOT Privacy Safety-Critical Systems Embedded Wireless Cloud
2/7/2018 9
Director of Research Electronic Systems
Research Areas:
Research Assistant Pro
Research Areas:
Affiliated Faculty
Electrical and Computer Enginee Research Areas:
Senior Research Associate
Research Areas:
Zach Leffke Research Associate Aerospace Systems
Research Areas:
Kevin Sterne Research Associate
Research Areas:
Michael Fowler Senior Research Associate
Research Areas:
Associate Director, Electronic Systems Lab
Research Areas:
Cybersecurity
10 2/7/2018
2/7/2018 11
2/7/2018 12
2/7/2018 19
2/7/2018 20
2/7/2018 22
2/7/2018 23
2/7/2018 24
2/7/2018 25
2/7/2018 26
2/7/2018 27
2/7/2018 28
Immediate Impact Evolutionary Developmen ts Revolutiona ry Technologie s Low-cost mechanisms to help protect today’s fleet. Security enhancements to current design process. Market discriminators for next generation vehicles OBD2 Security Cellular Backhaul Infotainmen t Security Key Fob Security (Identificatio n) CAN/IP (wireless) Hybrid Transactional Security Authorization FDMA separated communicati
Key Fob Crypt- analysis TPMS Security Hume Center Confidential
Objective Payoff Deliverables
Description
OBD2 port
attacks
This project will develop a hardware OBD2 interface which would provide additional security while maintaining access required by the “right to repair” law. This cannot simply be an interface which would plug in to the existing system, but must also prevent bypassing of the OBD2 port.
Immediate
1. Monthly Technical reports 2. Quarterly Technical Exchanges 3. Final Report 4. Hardware demonstration of OBD2 filter system
2/7/2018 29
Hume Center Confidential
Objective Payoff Deliverables
through the TPMS wireless threat surface
Description
This project will develop a GNU Radio implementation of the Tire Pressure Monitoring System (TPMS) RF signals. It will use low cost software defined radios. The project will begin by developing an algorithm to spoof TPMS signals and will continue by analyzing the extent to which the CAN bus can be affected through the TPMS threat surface.
Immediate
1. Monthly Technical reports 2. Quarterly Technical Exchanges 3. Final Report 4. Hardware demonstration of TPMS spoofing
2/7/2018 30
Hume Center Confidential
Objective Payoff Deliverables
make, model, year, and/or country from signal captures. 1. Report on the survey of key fob signal characteristics by car make, model, year, and/or country. 2. Classification software used to classify a key fob’s make, model, year, and/or country from signal captures. 3. Demonstration of any developed algorithms as well as a report outlining potential improvements to key fob security.
Description
based on its form factor).
target’s car quicker based on measured responses from the target’s key fob.
could scan a potential buyer’s key fobs and steer their interactions appropriately.
Our initial testing has indicated that different car manufacturers’ key fobs have slight differences in their signaling that could be used to identify the key fob when visual cues are not available.
Mercedes Benz Ford Focus Cadillac SRX USR P Classi fier USR P Classi fier USR P Classi fier
Immediate
2/7/2018 31
Hume Center Confidential
Objective Payoff Deliverables
system on a vehicle and determine possible vulnerabilities
and isolation, to secure the interfaces into the infotainment center. 1. Vulnerability analysis of the infotainment center and any interfaces available to the customer 2. Mitigation techniques and overall strategy to secure the interfaces from outside attack.
Description
compromise the security of the infotainment center in a vehicle.
affect the driver.
block attacks and reset the system if it is compromised.
White hat hackers have recently demonstrated the ability to control different components of a vehicle by injecting malware into its infotainment system.
Immediate
2/7/2018 32
Hume Center Confidential
Objective Payoff Deliverables
system
harvesting
1. Monthly Technical report 2. Final Report 3. Hardware demonstration of CAN/IP(wireless) system
Description
The current communications for today’s automobiles are all connected through the CAN bus. Some have suggested replacing the CAN bus with Ethernet and an IP protocol, but this is unlikely to provide the low latency required for safety critical systems. This project will develop a hybrid system of CAN and IP (Ethernet and Wireless) connected devices.
Evolutionar y
2/7/2018 33
Hume Center Confidential
Payoff Deliverables
susceptible a car’s rolling codes are to attack.
1. Report on the survey of the characteristics of car rolling codes as a function of make, model, and/or year. 2. Cryptanalysis software that can be used to attack a car’s rolling code. 3. Demonstration of any developed algorithms as well as a report outlining potential improvements to key fob security based on the outcome of the work.
Description
fobs, which change the encryption of the data transmitted between the key fob and the car each time an action is performed. Key Fob’s UHD Response given a Door Unlock Button Press
are as a function of make, model, and/or year.
eavesdrop on a target’s key fob and use cryptanalysis approaches to gain access to the car at will or spoof the key fob.
code from a cryptanalysis perspective based on the results of this work. Preamble Encrypted Data (using a rolling code)
Evolutionar y
Objective
2/7/2018 34
Hume Center Confidential
communication link with a spoofing attack against the vehicle using a software defined rogue base station
supporting remote access. Run a penetration test on the component’s operating system.
Objective Payoff Deliverables
1. Vulnerability analysis of the components providing the cellular backhaul connection for the vehicle 2. Solutions to secure vehicle against rogue base-station attacks and techniques to isolate critical components.
Description
with a spoofing attack
vehicle’s subsystems and the backhaul
cellular system can be compromised.
from network intrusion. Many manufactures include cellular backhaul links in their vehicles to provide the connectivity required for systems such as OnStar. There is a possibility of these systems connecting to rogue base stations and those links being used to compromise the system. Normal Cellular Link Rogue Base- station Injection/Network attacks Spoofed Link
Evolutionar y
2/7/2018 35
Hume Center Confidential
Objective Payoff Deliverables
1. Monthly Technical reports 2. Year 1 Interim Summary Report 3. Simulation and hardware demonstrations to show proof of concept (~quarterly) 4. Final Report
Description
Many automotive hacks exploit the shared messaging structure of the CAN bus, yet many security measures have the potential to add unacceptable latency or design complexity. Transitioning the CAN bus to a frequency channelized bus where each channel has a specific security level (similar to multi-level secure DoD systems) enables robust new security mechanisms without latency or complexity impacts. (VT patent pending)
and perform targeted validation on a live vehicle (year 1).
live vehicle and develop a system-wide framework to quantify security levels, costs, and benefits (year 2).
automotive systems offers significant improvements to the robustness of the core infrastructure. It also reduces the risk of integrating emerging technologies into vehicular systems, since impacts on life-critical systems are prevented by design.
Revolutiona ry
2/7/2018 36
Hume Center Confidential
Revolutiona ry
Objective
The goal is to develop transactional security authorization into real-time serial communications of vehicular cyber physical systems without compromising real-time
computational resources.
Description
Cyrptosystems
concentrate
ensuring confidentiality, integrity, authentication, authorization, and nonrepudiation but cyber physical systems also have the necessity of understanding the context of a request. Transactional security takes into account the context of a request and applies acceptance/rejection based upon the situation.
Payoff
using authorization mechanisms well-suited for real- time embedded serial communications that are not Enterprise IT Security wrappers.
authorized behavior during unauthorized situations.
industry wide adaptation and plug-and-play.
Deliverables
1. Monthly Technical report 2. Transactional Security Simulation & Algorithms (Yr. 1) 3. Transactional Security Laboratory Evaluation (Yr. 2) 4. Final Report consisting of an RFC/IEEE Standard Document for submittal for industry review and acceptance
2/7/2018 37
Hume Center Confidential
2/7/2018 38
39
40
www.vita.virginia.gov
Joy Young Information Assurance Analyst
www.vita.virginia.gov
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
www.vita.virginia.gov
60
61
Bill Freda, VI TA John Craft, VI TA
I SOAG m eets the 1 st W ednesday of each m onth in 2 0 1 8
62
* Contact Com m onw ealthSecurity@vita.virginia.gov for m ore inform ation
63
64
Picture courtesy of www.v3.co.uk