Spezifikation, Verifikation, Testtheorie

Transcription

Spezifikation, Verifikation, Testtheorie
Informationssicherheit
eingebetteter Systeme
21.10.2009: Einleitung
Prof. Dr. Holger Schlingloff
Institut für Informatik
und
Fraunhofer FIRST
Ankündigungsfolie vom 8.10.2009
•
•
•
•
•
Titel „Informationssicherheit eingebetteter Systeme “
Zeit: Mittwoch 11:15 – 12:45, RUD25, 4.113
Beginn: 21.10. (!)
Prüfbar: JA (mündliche Prüfung)
Inhalt
Einführung in eingebettete Systeme
Grundlagen Informationssicherheit
Bedrohungen und Schutzmaßnahmen
Spezielle Herausforderungen an Rechenleistung, Energie,
Kommunikation
Entwicklungsprozesse
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
2
„Informationssicherheit eingebetteter Systeme“
• Reihe von Vorlesungen zum Thema
„Eingebettete Systeme – Produktivität und Qualität“
„Eingebettete Systeme – Sicherheit und Zuverlässigkeit“
• Baut NICHT auf VL vom SS auf
Wiederholungen evtl. unvermeidbar
Zwei Seiten der selben Medaille
• Verwandte Vorlesungen
Zuverlässige Systeme, Eigenschaften mobiler und
eingebetteter Systeme
Kryptologie, Elektronische Signaturen
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
3
Hinweise
• Vorlesung entfällt:
am 18. & 25.11. (SEFM)
am 16.12. (Koll. UHB)
• Ersatz: Vorlesungen von M. Conrad
Thema Automotive Security
Termin nach Vereinbarung (WebEx!)
• Blockvorlesung M. Roggenbach
15.-17.1.2010
22.-24.1.2010
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
4
Blockvorlesung „Algebraische Spezifikation“
• Titel: „Algebraische Spezifikation von Software und
•
Hardware“ (H. Schlingloff / M. Roggenbach)
Veranstaltungsform: Block-Kurs an 2 Wochenenden
15.1. nachmittags, 16.1., 17.1.
22.1. nachmittags, 23.1., 24.1
• Inhalt
Spezifikationsformalismen
Common Algebraic Specification Language
Industrielle Anwendungsbeispiele
Werkzeuge (Theorembeweiser, Transformatoren)
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
5
Further Remarks
• Slides will be in English ☺
• We will have a few mascots
indicating a break ☺
• Slides (without cartoons)
available on web site
http://www2.informatik.hu-berlin.de/~hs/Lehre/2009-SS_EmSec/index.html
after the lecture
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
6
Recommended Reading
• Claudia Eckert: IT-Sicherheit
Konzepte - Verfahren – Protokolle,
div. Auflagen, Oldenbourg
• Matt Bishop, Computer Security
- Art and Science, Addison-Wesley
• Peter Marwedel, Embedded System
Design, Springer
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
7
The Topic “Embedded Security”
• “Fashion” research topic
• Not yet very mature
many research papers
some real, some imagined threats
different lectures with different emphasis
• Industrial relevance questionable
however, significant standard methods exist
“state-of-the-art” must be followed
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
8
Contents – What You Should Learn
• Embedded systems design
• Foundations of security
• Threats and protective measures
information security threats
technical systems threats and measures
• Special challenges for embedded systems
security processing gap
battery gap
assurance gap
• Processes and methods
structured development methods
validation and proof, formal methods
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
9
Structure
1. Introductory example
2. Embedded systems
engineering
1. definitions and terms
2. design principles
3. Foundations of security
1. threats, attacks, measures
2. construction of safe systems
4. Design of secure systems
1. design challenges
2. safety modelling and
assessment
3. cryptographic algorithms
Embedded Security © Prof. Dr. H. Schlingloff 2009
5. Communication of
embedded systems
1.
2.
remote access
sensor networks
6. Algorithms and
measures
1.
2.
3.
4.
digital signatures
key management
authentification
authorization
7. Formal methods for
security
1.
2.
protocol verification
logics and proof methods
21.10.2009
10
Introductory Example
• “Malicious Control System Cyber
Security Attack Case Study –
Maroochy Water Services, Australia”
Reference: M. D. Abrams, J. Weiss; Annual Computer
Security Applications Conference, Dec. 2008
http://csrc.nist.gov/sec-cert/ics/papers.html
• Actual control system cyber event
resulted in environmental and economic damage
malicious attack by knowledgeable insider, who had been
a trusted contractor employee
timelines, control system response, and control system
policies well investigated
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
11
Attack Synopsis
• Players: V.B., Hunter Watertech, Maroochy Shire Council
Mr. B. had worked for Hunter Watertech, a small Australian firm that
installed radio-controlled sewage equipment for the Maroochy Shire
Council in Queensland, Australia (a rural area of great natural beauty
and a tourist destination )
coming from a “strained relationship” with Hunter Watertech,
B applied for a job with the Maroochy Shire Council
the Council decided not to hire him
he decided to “get even” with both the Council and his former
employer
• On at least 46 occasions the offender issued remote radio
commands to the sewage equipment of Maroochy Shire
these commands caused 800.000 litres of raw sewage to spill out into
local parks, rivers and even the grounds of a Hyatt Regency hotel
huge environmental and financial damage: marine life died, the creek
water turned black and the stench was unbearable for residents
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
12
Time Line
•
•
•
•
1997-December 1999: B employed by Hunter Watertech
Dec. 3, 1999: B resigns, seeks City Council employment
Early January 2000: B turned down
Feb 9-Apr 23, 2000: system experiences a series of faults
Pumps were not running when they should have been
Alarms were not reporting to the central computer
A loss of communication between the central computer and various
pumping stations.
• Mar 16, 2000: Hunter Watertech tried to troubleshoot system
• Apr 19, 2000: Log indicates that a certain system program
•
had been run (manually) at least 31 times
Apr 23, 2000: Alarms at four pumping stations were disabled
using the identification of a fake pumping station
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
13
Time Line (continued)
• Apr 23, 2000: B, who was under police surveillance, was
•
•
•
•
•
pulled over by police with computer equipment in car
“Later investigations found B's laptop had been used at the
time of the attacks and his hard drive contained software for
accessing and controlling the sewage management system“
(http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/)
B asserted in a taped conversation that all the items in the
vehicle were his own. He said he had been up to Rainbow
Beach and that he used the computer for study, personal
correspondence and work in his family business
B sought to establish that some of the electronic messages
that gave rise to the charges could have been caused by
system malfunction or by error of Council employees
Oct 31, 2001: B convicted in trial, sentenced to 2 years
Mar 21, 2002: Appeal rejected
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
14
Evidence Found in B’s Vehicle
• Laptop
software reloaded February 28, 2000
software used in the sewerage system (re)installed February 29
•
- run at least 31 times prior to April 19
- last run on April 23
“Motorola M120 two-way radio”
(same type used in the Council’s system)
tuned into the frequencies of the repeater stations
serial numbers matched delivery docket provided by the supplier of
the radios to Hunter Watertech
• “PDS Compact 500” computer control device
address set to spoof pumping station
serial number identified it as a device which should have been in the
possession of Hunter Watertech
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
15
Consideration
• Obviously, this was a “malicious attack”. Why?
• Obviously, the offender had to be jailed.
Why?
• Obviously, he was the offender. Why?
• Obviously, this could have been prevented.
How?
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
16
Observations (1/3)
• B was an insider who was never an employee of the
organization he attacked
Employee of contractor that supplied IT/control system
technology
- With his knowledge he was the “ultimate insider”
Difficulty to protect against insider attacks
• Contractor’s responsibilities unspecified / inadequate
Management, technical and operational cyber security
controls
Personnel security controls
- Background investigations
- Protection from disgruntled employees
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
17
Observations (2/3)
• As a skilful adversary, B was able to disguise his
actions
A number of anomalous events occurred before
recognition that the incidents were intentional
Extensive digital forensics were required to determine that
a deliberate attack was underway
• Importance to determine whether intentional attack,
or unintentional flaw or error
Insufficient means to differentiate attacks from
malfunctions
No existing cyber security policies or procedures
No cyber security defences
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
18
Observations (3/3)
• Radio communications used in system insecure or improperly
configured
Wireless devices and software should be secured to the extent
possible using physical and logical controls
Security controls not implemented or used properly
• Lack of adequate logging mechanisms for forensic purposes
• Insufficient further measures
Anti-virus
Firewall protection
Appropriate use of encryption
Upgrade-able systems (from a security perspective)
Proper staff training
Security auditing and control.
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
19
Learning From the Maroochy Shire Cyber Attack
• Public record of an intentional, targeted attack by a
knowledgeable person on an industrial control system
teaches us to consider:
Critical physical, administrative, and supply chain vulnerabilities
Vulnerabilities coming from suppliers or others outside the
organization
Contractor and sub-contractor personnel as a potential attack source
• Need to be concerned with both inside & outside attack
• Difficulty in identifying a control system cyber incident as a
•
•
malicious attack and retaking control of a “hijacked” system
A determined, knowledgeable adversary could potentially
defeat most controls
Structured defence-in-depth security is best
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
20
Abrams / Weiss Political Conclusions
• Public and private sector enterprises today are highly
dependent on information systems to carry out their
missions and business functions
• Developments in embedded systems have seen
these traditionally closed systems become open and
internet-connected, thus putting the national
services critical infrastructure at risk
• To achieve mission and business success, enterprise
information systems must be dependable in the face
of serious cyber threats
• To achieve information system dependability, the
systems must be appropriately protected
2b discussed: Do you agree with these statements?
Embedded Security © Prof. Dr. H. Schlingloff 2009
21.10.2009
21