SlideShare a Scribd company logo
Safe & Secure Systems
SRC’s Automotive Cybersecurity and Autonomous Vehicles Workshop in Dallas
Wednesday, September 27
by Alan Tatourian
Member of SAE Vehicle Cybersecurity Committee
2
Trustworthiness (NIST 800-160)
• Systems engineering provides the basic foundation for a disciplined
approach to engineering today’s trustworthy systems.
• Trustworthiness, in this context, means simply worthy of being trusted
to fulfill whatever critical requirements may be needed for a particular
component, subsystem, system, network, application, mission,
enterprise, or other entity.
• Trustworthiness requirements can include, for example, attributes of
safety, security, reliability, dependability, performance, resilience, and
survivability under a wide range of potential adversity in the form of
disruptions, hazards, and threats.
• Effective measures of trustworthiness are meaningful only to the extent
that the requirements are sufficiently complete and well-defined, and
can be accurately assessed.
3
Primary Security Concerns
Relations between information security, cryptography, physical security
and physical roots of trust
Cryptographic
Primitives
PKCS#11
Physical Root of Trust PUF TRNG Secure Logic . . .
Physical World
Secure Key
Generation
(KDF)
Physical Security
Objectives
FIPS 140-2 Levels 2/3
Secure (Key)
Storage
Trusted
Execution
Environment
. . .
Cryptographic
Acceleration
Physical
Tamper
Protection
Secure Hash
(SHA2, SHA3)
Digital Signatures
(RSA, ECDSA)
Message Authentication Code
(CMAC, HMAC, GMAC, HMACSHA)
Symmetric Crypto
(AES-128, AES-256)
Asymmetric Crypto for
signing/verification
(RSA-2K, 3K, 4K)
Elliptic Crypto
(25519, P-256, P-384, P-512)
Cryptographic Agility . . .Protocols
Information Security
Objectives
Availability Integrity Confidentiality . . .Authorization
Non-
repudiation
(sometimes)Hardware
Security
Module
Boundary
5
Information Security Goals
1. Auditing and logging
2. Authentication and authorization
3. Session management
4. Input validation and output encoding
5. Exception management
6. Cryptography and integrity
7. Data at rest
8. Data in motion
9. Configuration management
10. Incidence response and patching
• Together, these formulate the end-to-end security architecture for the product and thus should be
considered alongside one another—not in isolation. Also, each of the categories has many sub-
topics within it. For example, under authentication and authorization there are aspects of
discretionary access controls and mandatory access controls to consider. Security policies for the
product are an outcome of the implementation decisions made during development across these
nine categories.
6
Main security requirements (per HW module)
• SoC
• Dedicated Security Core (HSM)
• Full cryptographic stack
• Discrete Execution Environments
Common Requirements: SoC, FPGA, ASIC
• Secure and fast boot
• Secure Debug
• Unique Device ID
• Anti-cloning and Tamper Protection
• Remote background ECU firmware update
• Remote Attestation
Customization
• IP protection and customizations
• DRM for Features
AI Security for Autonomous Driving
• Invariant-based IDS
7
Vehicle Reference Security Architecture
4G/5G DSRC
Connectivity
Gateway
(OTA)
Head Unit
Display
SDC ECU
Instrument
Cluster
Display
Central
Gateway
ADAS/AD ECU
Powertrain
DC
Body DC
Chassis DC
EDR
Smart
Charging
Laptop
Tablet
Smart
Phone
Secure off-board communication
Secure on-board communication
Secure boot, storage, cryptographic services
Firewall
Download Manager (OTA)
Intrusion Detection & Prevention System (IDPS)
Secure Monitoring & Logging
Secure Synchronized Time Manager
TCU
8
Defense in Depth
Occupant safety
Surround sensors
Brake control system
Electric power steering
CAN bus
V2X antenna
Mobile Devices
ISP
BS
BSGPS
Electric Chargers
Fast cryptographic performance
Device identification
Isolated execution
(Message) Authentication
Virtualization
Hardware security services that can be used by applications
Platform boot integrity and Chain of Trust
Secure Storage (keys and data)
Secure Communication
Secure Debug
Tamper detection and protection from side channel attacks
Hardware security building blocks
Over-the Air Updates/Background Reflashing
IDPS / Anomaly Detection
Network enforcement, VPN and secure tunnels
Certificate and Key Management
Antimalware and remote monitoring
Biometrics
User/operator authentication and access control
Software and Services
Security features in the silicon, for example Memory Scrambling, Execution
Prevention, etc.
Defense in Depth
HardwareRootofTrust
Analog security monitoring under the CPU
9
What do we do with AI?!
10
Computer Vision Now
11
Functional Safety & Security Architecture• There are 3 sides of security:
• Automotive SDL (aligned with FuSa)
• System hardening (similar to FuSa, the goal is to ensure there are no single points
of failure)
• Security features (encryption, signatures, etc. – working with FuSa is very
important to prevent false positives)
• All of these have to be considered during system lifecycle from conception
through design and to maintenance while the system is in the wild (for at
least 15 years!!!).
• Security should not be viewed in isolation from the system design and other
inputs including safety, privacy, survivability, etc. (slide with the umbrella).
Product Heterogeneous Architecture
Safety Island
Security Island
(PKCS 11, FIPS 140-2 L2/3)
FuSa (ISO 26262)SDL (ISO 21434)
ASIL Security
Process
Safety/Security
Architecture
Device
Reliability &
Trustworthiness
Process
Platform Hardening for
Safety and Security
Safety & Security
Architecture
FuSa (ISO 26262)
Functional SafetySecurity
Self-Test and Recovery
(STAR)
Safety Island
SDL (ISO 21434)
The principle of least
privilege (POLP)
Security Island
Platform
12
Functional Safety and Security Helping Each-
Other
Security threats
affecting safety
Security measures
helping safety
Safety measures
helping security
Safety measures as
vulnerable points for
security attacks
Attackers can disable/modify or affect
safety critical functions or breach
Freedom from Interference (FFI)
Attackers can activate safety
mechanisms to attack the safety-critical
function (deploy airbags)
Message authentication in a safety-
critical communication
Attacks interpreted as faults and
detected by a safety mechanism.
13
Safety and Security can be at odds
• Safety encourages stable software versions while security encourages
updates, breaking safety certification/qualification.
• While safety implicitly expects that access should be easily possible for
a quick and easy analysis, security would restrict access as strictly as
possible via authentication and authorization mechanisms.
• Security mechanisms add latency, for example fast boot where TPM
initialization (measurement) adds valuable time.
• Another feature of security is the question of how a safe state should
be defined in the event of an error. To meet the protection objectives of
confidentiality and integrity, it is conceivable that operation should be
shut down in the event of an error; however, this immediately causes
conflict with the protection objective of availability.
Cannot isolate security and functional safety
from the system architecture
14
1. Interactive computing.
2. Time sharing.
3. User authentication.
4. File sharing via hierarchical
file systems.
5. Prototypes of ‘computer
utilities’.
Emerging
concerns
1. Access controls
2. Passwords
3. Supervisor state
Security
Technologies
1960s
1. Packet networks
(ARPANET)
2. Local networks (LANs)
3. Communication secrecy
and authentication
4. Object-oriented design
5. Multilevel security
6. Mathematical models of
security
7. Provably secure systems
1. Public key cryptography
2. Cryptographic protocols
3. Cryptographic hashes
4. Security verification
1. Adoption of TCP/IP
protocols for the Internet
2. Exponential growth of
Internet
3. Proliferation of PCs and
workstations
4. Client-server model for
network services
5. Viruses, worms, Trojans,
and other forms of
malware
6. Buffer overflow attacks
1. Malware detection
(antivirus)
2. Intrusion detection
3. Firewalls
1. World Wide Web
2. Browsers
3. Commercial transactions
4. Data repositories and
breaches
5. Portable apps and scripts
6. Internet fraud
7. Web-based attacks
8. Social engineering and
phishing attacks
9. Peer-to-peer (P2P)
Networks
1. Virtual private networks
(VPNs)
2. Public-key infrastructure
(PKI)
3. Secure web connections
(SSL/TLS)
4. Biometrics
5. 2-factor authentication
6. Confinement (virtual
machines, sandboxes)
1. Botnets
2. Denial-of-service attacks
3. Wireless networks
4. Cloud platforms
5. Massive data breaches
6. Ransomware
7. Malicious adware
8. Internet of things
9. Surveillance
10. Cyber warfare
1. Secure coding and
development processes
2. Threat intelligence and
sharing
3. Adware blocking
4. Denial-of-service mitigation
5. WiFi security
1970s 1980s 1990s 2000s
Here’s our final security toolkit, we are good!!!
Any new ideas in the last 20 years?!
15
And after all we’ve done, there is this!
1980 1985 1990 1995 2000 2005
Source: escrypt
Increasing digitalization and
digital integration
Security
Escalation:
Hypothetical vulnerabilities
identified
Security threats become
relevant in practice
Regular security breaches with
severe damages
ICS-CERT
(2008)
20152010 2020
???
CAESS
(2010)
GSM Interface
Exploit (2015)
Stuxnet and Duqu
(2010/11)
German Steel Plant
(2014)
AS/1 Card
Cracking (2009)
IMSI Catcher, NSA
iBanking (2014)
Cabir, Premium
SMS Fraud (2008)
DOS via SMS
DoCaMo (2008)
I Love You
(2010)
Heart Bleed
(2014)
Sasser
(2004)
Melissa
(1999)
Michelangelo
(1992)
Leandro
(1993)
Brain
(1986)
F. Cohen
(1981)
Confliker
(2008)
NSA, PRISM Reign
(2014)
SQL Slammer
(2003)
Code Red
(2001)
Morris Worm
(1988)
Tribe Flood DDOS
(1998)
CCC BTX Hack
(1984)
Creeper
(1971)
16
Cryptography != Security
• Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.
• – Attributed by Roger Needham and Butler Lampson to each other
Security is much more than cryptography!
Here’s an example of mitigation techniques of vulnerabilities in SW:
Type 0 – Strong Mitigation: End a bug class
Type 1 – Weak Mitigation: End an exploitation technique
Type 2 – Attack Surface Reduction: Remove a set of exposed functionality
Type 3 – Chain Extension: Increase the number of bugs required in an exploit
Cryptography rots, just like food. Every key and every algorithm has shelf time. Some have very short shelf time.
• How long do you need your cryptographic keys or algorithms to be secure? – this is cryptography shelf life (x
years)
• How long will it take to extract secrets out of your system? – this is the end of honeymoon (z years)
• What are your parameters to reduce attack surface and to update keys or algorithms? -  (pronounced Xi)
𝐼𝑓 𝑧 < 𝑥 + 𝜉, 𝑖𝑚𝑝𝑟𝑜𝑣𝑒 𝑦𝑜𝑢𝑟 𝑎𝑟𝑐ℎ𝑖𝑡𝑒𝑐𝑡𝑢𝑟𝑒 𝑎𝑛𝑑 𝑖𝑛𝑓𝑟𝑎𝑠𝑡𝑟𝑢𝑐𝑡𝑢𝑟𝑒!
Vulnerabilities: Starts slow,
Then speeds up!
Bugs: Starts fast,
Then slows down
The Honeymoon Effect
17
• What is intelligence?
• Intelligence is a force, or at least it can be modelled as a force, that maximizes future freedom of action either in thermodynamic terms if you
are a statistical physicist or in information terms if you are a computer scientist.
• Intelligent behavior can be defined as a force that tries to climb a gradient landscape and maximize the future freedom of action.
The question of whether Machines Can Think… is about as relevant as the question of
whether Submarines Can Swim.
‒ Edsger W. Dijkstra
Call for Research: AI
1. Develop AI which provides deterministic categorization and decisions (I see a human, and not ‘human: 75%,
horse 3%, I have no clue 1.8%’)
2. Develop AI which can construct contextual explanatory models (I see a human about to cross the road because…)
3. Develop AI causality (A boy threw a ball, a ball may roll to the road, a boy may run after the ball)
4. At a system level, constrain AI to a bounding box to ensure correct behavior of the moving vehicle
Call for Research: Self-HealingEmerging
concerns
(New!)Security
Technologies
Attacks against Cyber-Physical Systems (CPS):
1. Autonomous vehicles
2. Smart communities
3. Aviation and transportation
4. Robots
5. Drones
6. Infrastructure
• Self-adaptive Systems which can evaluate and modify their
own behavior to improve efficiency, and which can self-heal.
• Multi-agent Systems, a loosely coupled network of software
agents that interact to solve problems, are resilient and
partition tolerant.
• Self-optimizing Systems based on Artificial Intelligence
(Genetic Algorithms?).
From around 2015 through present time
In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and,
without human intervention, make the necessary adjustments to restore itself to normal operation. IBM, for example, is working on an
autonomic computing initiative that the company defines as providing products that are self-configuring, self-optimizing, and self-
protecting - as well as self-healing. For all of these characteristics together, IBM uses the term "self-managing."
Every 30 years there is a new wave of things that
computers do. Around 1950 they began to model
events in the world (simulation), and around 1980
to connect people (communication). Since 2010
they have begun to engage with the physical
world in a non-trivial way (embodiment – giving
them bodies).
– Butler Lampson, Microsoft Research

More Related Content

What's hot

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
Itex Solutions
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
Jim Gilsinn
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
Eran Goldstein
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Chris Sistrunk
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
Derek Harp
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
Deepakraj Sahu
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
Digital Bond
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
Alan Tatourian
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
AVEVA
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
Informatik-Forum Stuttgart e.V.
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
James Nesbitt
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Onward Security
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
PECB
 

What's hot (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 

Similar to Safe and secure autonomous systems

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
Chuck Speicher
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
Kirti Ahirrao
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
mentoresd
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
HCL Technologies
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
Alexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Alexander Decker
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
L. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
L. Duke Golden
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
Priyanka Aash
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
Alan Tatourian
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
laonap166
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
Charles "Chuck" Speicher Jr.
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
AVEVA
 

Similar to Safe and secure autonomous systems (20)

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
Security for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangoutSecurity for io t apr 29th mentor embedded hangout
Security for io t apr 29th mentor embedded hangout
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 

Recently uploaded

final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdffinal-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
Ashfaq Ahmad
 
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
bouvoy
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
eygkup
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
TRAINEES-RECORD-BOOK- electronics and electrical
TRAINEES-RECORD-BOOK- electronics and electricalTRAINEES-RECORD-BOOK- electronics and electrical
TRAINEES-RECORD-BOOK- electronics and electrical
JohnCarloPajarilloKa
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
mymwpc
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
afkxen
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
jennifermiller8137
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
jennifermiller8137
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
Perth City Skoda
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
vaterland
 
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
mymwpc
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
78tq3hi2
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
78tq3hi2
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
afkxen
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
vaibhavsrivastava482521
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
Sprinter Gurus
 
Manual despiece Yamaha fuera de borda pc_e40x_02.pdf
Manual despiece Yamaha fuera de borda pc_e40x_02.pdfManual despiece Yamaha fuera de borda pc_e40x_02.pdf
Manual despiece Yamaha fuera de borda pc_e40x_02.pdf
GermanValentini1
 
EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
Forth
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects
 

Recently uploaded (20)

final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdffinal-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
final-slide-deck-ACURE-AQ-December-1-webinar-2022.pdf
 
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
一比一原版(UNITEC毕业证)UNITEC理工学院毕业证成绩单如何办理
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
TRAINEES-RECORD-BOOK- electronics and electrical
TRAINEES-RECORD-BOOK- electronics and electricalTRAINEES-RECORD-BOOK- electronics and electrical
TRAINEES-RECORD-BOOK- electronics and electrical
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
 
Skoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda PerthSkoda Octavia Rs for Sale Perth | Skoda Perth
Skoda Octavia Rs for Sale Perth | Skoda Perth
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
 
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
一比一原版(OP毕业证)奥塔哥理工学院毕业证成绩单如何办理
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
 
Manual despiece Yamaha fuera de borda pc_e40x_02.pdf
Manual despiece Yamaha fuera de borda pc_e40x_02.pdfManual despiece Yamaha fuera de borda pc_e40x_02.pdf
Manual despiece Yamaha fuera de borda pc_e40x_02.pdf
 
EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
 

Safe and secure autonomous systems

  • 1. Safe & Secure Systems SRC’s Automotive Cybersecurity and Autonomous Vehicles Workshop in Dallas Wednesday, September 27 by Alan Tatourian Member of SAE Vehicle Cybersecurity Committee
  • 2. 2 Trustworthiness (NIST 800-160) • Systems engineering provides the basic foundation for a disciplined approach to engineering today’s trustworthy systems. • Trustworthiness, in this context, means simply worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity. • Trustworthiness requirements can include, for example, attributes of safety, security, reliability, dependability, performance, resilience, and survivability under a wide range of potential adversity in the form of disruptions, hazards, and threats. • Effective measures of trustworthiness are meaningful only to the extent that the requirements are sufficiently complete and well-defined, and can be accurately assessed.
  • 4. Relations between information security, cryptography, physical security and physical roots of trust Cryptographic Primitives PKCS#11 Physical Root of Trust PUF TRNG Secure Logic . . . Physical World Secure Key Generation (KDF) Physical Security Objectives FIPS 140-2 Levels 2/3 Secure (Key) Storage Trusted Execution Environment . . . Cryptographic Acceleration Physical Tamper Protection Secure Hash (SHA2, SHA3) Digital Signatures (RSA, ECDSA) Message Authentication Code (CMAC, HMAC, GMAC, HMACSHA) Symmetric Crypto (AES-128, AES-256) Asymmetric Crypto for signing/verification (RSA-2K, 3K, 4K) Elliptic Crypto (25519, P-256, P-384, P-512) Cryptographic Agility . . .Protocols Information Security Objectives Availability Integrity Confidentiality . . .Authorization Non- repudiation (sometimes)Hardware Security Module Boundary
  • 5. 5 Information Security Goals 1. Auditing and logging 2. Authentication and authorization 3. Session management 4. Input validation and output encoding 5. Exception management 6. Cryptography and integrity 7. Data at rest 8. Data in motion 9. Configuration management 10. Incidence response and patching • Together, these formulate the end-to-end security architecture for the product and thus should be considered alongside one another—not in isolation. Also, each of the categories has many sub- topics within it. For example, under authentication and authorization there are aspects of discretionary access controls and mandatory access controls to consider. Security policies for the product are an outcome of the implementation decisions made during development across these nine categories.
  • 6. 6 Main security requirements (per HW module) • SoC • Dedicated Security Core (HSM) • Full cryptographic stack • Discrete Execution Environments Common Requirements: SoC, FPGA, ASIC • Secure and fast boot • Secure Debug • Unique Device ID • Anti-cloning and Tamper Protection • Remote background ECU firmware update • Remote Attestation Customization • IP protection and customizations • DRM for Features AI Security for Autonomous Driving • Invariant-based IDS
  • 7. 7 Vehicle Reference Security Architecture 4G/5G DSRC Connectivity Gateway (OTA) Head Unit Display SDC ECU Instrument Cluster Display Central Gateway ADAS/AD ECU Powertrain DC Body DC Chassis DC EDR Smart Charging Laptop Tablet Smart Phone Secure off-board communication Secure on-board communication Secure boot, storage, cryptographic services Firewall Download Manager (OTA) Intrusion Detection & Prevention System (IDPS) Secure Monitoring & Logging Secure Synchronized Time Manager TCU
  • 8. 8 Defense in Depth Occupant safety Surround sensors Brake control system Electric power steering CAN bus V2X antenna Mobile Devices ISP BS BSGPS Electric Chargers Fast cryptographic performance Device identification Isolated execution (Message) Authentication Virtualization Hardware security services that can be used by applications Platform boot integrity and Chain of Trust Secure Storage (keys and data) Secure Communication Secure Debug Tamper detection and protection from side channel attacks Hardware security building blocks Over-the Air Updates/Background Reflashing IDPS / Anomaly Detection Network enforcement, VPN and secure tunnels Certificate and Key Management Antimalware and remote monitoring Biometrics User/operator authentication and access control Software and Services Security features in the silicon, for example Memory Scrambling, Execution Prevention, etc. Defense in Depth HardwareRootofTrust Analog security monitoring under the CPU
  • 9. 9 What do we do with AI?!
  • 11. 11 Functional Safety & Security Architecture• There are 3 sides of security: • Automotive SDL (aligned with FuSa) • System hardening (similar to FuSa, the goal is to ensure there are no single points of failure) • Security features (encryption, signatures, etc. – working with FuSa is very important to prevent false positives) • All of these have to be considered during system lifecycle from conception through design and to maintenance while the system is in the wild (for at least 15 years!!!). • Security should not be viewed in isolation from the system design and other inputs including safety, privacy, survivability, etc. (slide with the umbrella). Product Heterogeneous Architecture Safety Island Security Island (PKCS 11, FIPS 140-2 L2/3) FuSa (ISO 26262)SDL (ISO 21434) ASIL Security Process Safety/Security Architecture Device Reliability & Trustworthiness Process Platform Hardening for Safety and Security Safety & Security Architecture FuSa (ISO 26262) Functional SafetySecurity Self-Test and Recovery (STAR) Safety Island SDL (ISO 21434) The principle of least privilege (POLP) Security Island Platform
  • 12. 12 Functional Safety and Security Helping Each- Other Security threats affecting safety Security measures helping safety Safety measures helping security Safety measures as vulnerable points for security attacks Attackers can disable/modify or affect safety critical functions or breach Freedom from Interference (FFI) Attackers can activate safety mechanisms to attack the safety-critical function (deploy airbags) Message authentication in a safety- critical communication Attacks interpreted as faults and detected by a safety mechanism.
  • 13. 13 Safety and Security can be at odds • Safety encourages stable software versions while security encourages updates, breaking safety certification/qualification. • While safety implicitly expects that access should be easily possible for a quick and easy analysis, security would restrict access as strictly as possible via authentication and authorization mechanisms. • Security mechanisms add latency, for example fast boot where TPM initialization (measurement) adds valuable time. • Another feature of security is the question of how a safe state should be defined in the event of an error. To meet the protection objectives of confidentiality and integrity, it is conceivable that operation should be shut down in the event of an error; however, this immediately causes conflict with the protection objective of availability. Cannot isolate security and functional safety from the system architecture
  • 14. 14 1. Interactive computing. 2. Time sharing. 3. User authentication. 4. File sharing via hierarchical file systems. 5. Prototypes of ‘computer utilities’. Emerging concerns 1. Access controls 2. Passwords 3. Supervisor state Security Technologies 1960s 1. Packet networks (ARPANET) 2. Local networks (LANs) 3. Communication secrecy and authentication 4. Object-oriented design 5. Multilevel security 6. Mathematical models of security 7. Provably secure systems 1. Public key cryptography 2. Cryptographic protocols 3. Cryptographic hashes 4. Security verification 1. Adoption of TCP/IP protocols for the Internet 2. Exponential growth of Internet 3. Proliferation of PCs and workstations 4. Client-server model for network services 5. Viruses, worms, Trojans, and other forms of malware 6. Buffer overflow attacks 1. Malware detection (antivirus) 2. Intrusion detection 3. Firewalls 1. World Wide Web 2. Browsers 3. Commercial transactions 4. Data repositories and breaches 5. Portable apps and scripts 6. Internet fraud 7. Web-based attacks 8. Social engineering and phishing attacks 9. Peer-to-peer (P2P) Networks 1. Virtual private networks (VPNs) 2. Public-key infrastructure (PKI) 3. Secure web connections (SSL/TLS) 4. Biometrics 5. 2-factor authentication 6. Confinement (virtual machines, sandboxes) 1. Botnets 2. Denial-of-service attacks 3. Wireless networks 4. Cloud platforms 5. Massive data breaches 6. Ransomware 7. Malicious adware 8. Internet of things 9. Surveillance 10. Cyber warfare 1. Secure coding and development processes 2. Threat intelligence and sharing 3. Adware blocking 4. Denial-of-service mitigation 5. WiFi security 1970s 1980s 1990s 2000s Here’s our final security toolkit, we are good!!! Any new ideas in the last 20 years?!
  • 15. 15 And after all we’ve done, there is this! 1980 1985 1990 1995 2000 2005 Source: escrypt Increasing digitalization and digital integration Security Escalation: Hypothetical vulnerabilities identified Security threats become relevant in practice Regular security breaches with severe damages ICS-CERT (2008) 20152010 2020 ??? CAESS (2010) GSM Interface Exploit (2015) Stuxnet and Duqu (2010/11) German Steel Plant (2014) AS/1 Card Cracking (2009) IMSI Catcher, NSA iBanking (2014) Cabir, Premium SMS Fraud (2008) DOS via SMS DoCaMo (2008) I Love You (2010) Heart Bleed (2014) Sasser (2004) Melissa (1999) Michelangelo (1992) Leandro (1993) Brain (1986) F. Cohen (1981) Confliker (2008) NSA, PRISM Reign (2014) SQL Slammer (2003) Code Red (2001) Morris Worm (1988) Tribe Flood DDOS (1998) CCC BTX Hack (1984) Creeper (1971)
  • 16. 16 Cryptography != Security • Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography. • – Attributed by Roger Needham and Butler Lampson to each other Security is much more than cryptography! Here’s an example of mitigation techniques of vulnerabilities in SW: Type 0 – Strong Mitigation: End a bug class Type 1 – Weak Mitigation: End an exploitation technique Type 2 – Attack Surface Reduction: Remove a set of exposed functionality Type 3 – Chain Extension: Increase the number of bugs required in an exploit Cryptography rots, just like food. Every key and every algorithm has shelf time. Some have very short shelf time. • How long do you need your cryptographic keys or algorithms to be secure? – this is cryptography shelf life (x years) • How long will it take to extract secrets out of your system? – this is the end of honeymoon (z years) • What are your parameters to reduce attack surface and to update keys or algorithms? -  (pronounced Xi) 𝐼𝑓 𝑧 < 𝑥 + 𝜉, 𝑖𝑚𝑝𝑟𝑜𝑣𝑒 𝑦𝑜𝑢𝑟 𝑎𝑟𝑐ℎ𝑖𝑡𝑒𝑐𝑡𝑢𝑟𝑒 𝑎𝑛𝑑 𝑖𝑛𝑓𝑟𝑎𝑠𝑡𝑟𝑢𝑐𝑡𝑢𝑟𝑒! Vulnerabilities: Starts slow, Then speeds up! Bugs: Starts fast, Then slows down The Honeymoon Effect
  • 17. 17 • What is intelligence? • Intelligence is a force, or at least it can be modelled as a force, that maximizes future freedom of action either in thermodynamic terms if you are a statistical physicist or in information terms if you are a computer scientist. • Intelligent behavior can be defined as a force that tries to climb a gradient landscape and maximize the future freedom of action. The question of whether Machines Can Think… is about as relevant as the question of whether Submarines Can Swim. ‒ Edsger W. Dijkstra Call for Research: AI 1. Develop AI which provides deterministic categorization and decisions (I see a human, and not ‘human: 75%, horse 3%, I have no clue 1.8%’) 2. Develop AI which can construct contextual explanatory models (I see a human about to cross the road because…) 3. Develop AI causality (A boy threw a ball, a ball may roll to the road, a boy may run after the ball) 4. At a system level, constrain AI to a bounding box to ensure correct behavior of the moving vehicle
  • 18. Call for Research: Self-HealingEmerging concerns (New!)Security Technologies Attacks against Cyber-Physical Systems (CPS): 1. Autonomous vehicles 2. Smart communities 3. Aviation and transportation 4. Robots 5. Drones 6. Infrastructure • Self-adaptive Systems which can evaluate and modify their own behavior to improve efficiency, and which can self-heal. • Multi-agent Systems, a loosely coupled network of software agents that interact to solve problems, are resilient and partition tolerant. • Self-optimizing Systems based on Artificial Intelligence (Genetic Algorithms?). From around 2015 through present time In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and, without human intervention, make the necessary adjustments to restore itself to normal operation. IBM, for example, is working on an autonomic computing initiative that the company defines as providing products that are self-configuring, self-optimizing, and self- protecting - as well as self-healing. For all of these characteristics together, IBM uses the term "self-managing." Every 30 years there is a new wave of things that computers do. Around 1950 they began to model events in the world (simulation), and around 1980 to connect people (communication). Since 2010 they have begun to engage with the physical world in a non-trivial way (embodiment – giving them bodies). – Butler Lampson, Microsoft Research

Editor's Notes

  1. From Physically Unclonable Functions - Constructions, Properties and Applications
  2. AI: Resilience and Security in Cyber-Physical Systems: Self-Driving Cars and Smart Devices Karthik Pattabiraman University of British Columbia 2017 https://youtu.be/O6NKY2oE99M This is a joint Microsoft/Nvidia research. The first half of the talk is entirely on functional safety and resilience of DNNs, the second describes invariant-based Intrusion Detection System.
  3. Safety and security share the common goal of protecting integrity – meaning, the correct and intended functionality of the system against failures, errors, and mainly external influences. Security usually has more goals and other assets to protect, but in this area one finds the greatest overlap. Towards meeting this objective, both use a similar set of mechanisms, methods and resources, e.g. adding redundancy, monitoring, testing, and verification. Naturally, if applied independently, this often results in conflicts since both disciplines need access to the same set of limited resources: bandwidth of communication, storage space, processing time, access to flash and RAM, and others. It can be seen that, while the basic goal of preserving ‘Integrity’ remains the same across the disciplines, the methods employed by safety and security may conflict in the actual application. One good example is the ease of access to system resources. While safety implicitly expects that access should be easily possible for a quick and easy analysis, security would restrict access as strictly as possible via authentication and authorization mechanisms. In many cases, this can be resolved by granting authorization specifically to valid safety-monitoring entities at the cost of added (management) overhead. Nevertheless a trade-off needs to be found between allowing access for legitimate and authorized safety features while preventing an attacker from using this access to violate security goals. In order to distinguish a valid safety-mechanism from an attack, a codesign for safety and security mechanisms is necessary with need for compromise on both sides. Some safety mechanisms need re-evaluation, as to whether they can be used in presence of security needs. ]T. Gu, M. Lu, L. Li, Extracting interdependent requirements and resolving conflicted requirements of safety and security for industrial control systems, 1st International Conference on Reliability Systems Engineering (ICRSE), Beijing, China, 2015
  4. Every 30 years there is a new wave of things that computers do. Around 1950 they began to model events in the world (simulation), and around 1980 to connect people (communication). Since 2010 they have begun to engage with the physical world in a non-trivial way (embodiment – giving them bodies). Butler Lampson, Microsoft Research Cybersecurity Is Harder Than Building Bridges References Anti-Phishing Working Group. 2015. Phishing Activity Trends Report 1st-3rd Quarters 2015: Unifying the Global Response to Cybercrime. https://docs.apwg.org/reports/apwg_trends_report_q1-q3_2015.pdf American Society of Civil Engineers. 2013. 2013 Report Card for America’s Infrastructure. http://ascelibrary.org/doi/pdf/10.1061/9780784478837 Website:http://www.infrastructurereportcard.org/a/#p/home Briscoe, B., A. Odlyzko, and B. Tilly. 2006. Metcalfe’s law is wrong. IEEE Spectrum (posted July 1). http://www.spectrum.ieee.org/jul06/4109 Cohen, F. 1985. Computer viruses. PhD dissertation, University of Southern California, 1986. http://all.net/books/Dissertation.pdf The Center for Strategic and International Studies and McAfee. 2014. Net Losses: Estimating the Global Cost of Cybercrime.http://www.mcafee.com/hk/resources/reports/rp-economic-impact-cybercrime2.pdf CVE Details. 2015. Top 50 products by total number of “distinct” vulnerabilities in 2015. https://www.cvedetails.com/top-50-products.php?year=2015 Denning, P. J. 2016. Fifty years of operating systems. Communications of the ACM 59(3):30–32. Howard, M., and S. Lipner. 2006. The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices). Redmond, WA: Microsoft Press. Jardine, E. 2015. Global Cyberspace Is Safer Than You Think: Real Trends in Cybercrime. Centre for International Governance Innovation and Chatham House.https://www.cigionline.org/sites/default/files/no16_web_1.pdf Lampson, B. 2015. Perspectives on protection and security. Lecture, SOSP History Day, Monterey, California, October 4, 2015.http://dl.acm.org/citation.cfm?doid=2830903.2830905 Lemos, R. 2015. Pre-installed Android malware raises security risks in supply chain. eWeek September 1. http://www.eweek.com/security/pre-installed-android-malware-raises-security-risks-in-supply-chain.html Netmarketshare. 2015. Desktop operating system market share. Accessed 1/22/16.  https://www.netmarketshare.com/operating-system-market-share.aspx  Olenick, D. 2015. Companies leaving known vulnerabilities unchecked for 120 days: Kenna. SC Magazine September 30.http://www.scmagazine.com/companies-leaving-known-vulnerabilities-unchecked-for-120-days-kenna/article/441746/ Prevoty, Inc. 2015. The Impact of Security on Application Development: 2015 Survey Report. http://info.prevoty.com/impact-of-security-on-agile-development-report SANS Institute. 2015. CIS Critical Security Controls for Effective Cyber Defense. https://www.sans.org/critical-security-controls/ Shephard, D. 2015. 84 fascinating and scary IT security statistics. Micro Focus March 16. https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security-statistics/ Tehan, R. 2015. Cybersecurity: Data, Statistics, and Glossaries.Congressional Research Service Report R43310.https://www.fas.org/sgp/crs/misc/R43310.pdf Wilshusen, G. C. 2015. Information security: cyber threats and data breaches illustrate need for stronger controls across federal agencies.Testimony before the Subcommittees on Research and Technology and Oversight, Committee on Science, Space, and Technology, House of Representatives. United States Government Accountability Office, GAO-15-758T. http://www.gao.gov/assets/680/671253.pdf    http://www.americanscientist.org/issues/pub/cybersecurity-is-harder-than-building-bridges/1  
  5. Cryptography rots!