Fundamentals
Fundamentals
Physical Security
Nicolas Nicolaou
Funded by:
RoadMap
§ Intro to Cyber Security
www.kios.ucy.ac.cy
What does secure mean?
What is “Valuable”!?
www.kios.ucy.ac.cy
Security in a picture…
Control
Vulnerability
Thread
Sensitive System
www.kios.ucy.ac.cy
Kinds of Threads
www.kios.ucy.ac.cy
www.kios.ucy.ac.cy
Kinds of Threads
www.kios.ucy.ac.cy
www.kios.ucy.ac.cy
Kinds of Threads
www.kios.ucy.ac.cy
www.kios.ucy.ac.cy
Kinds of Threads
www.kios.ucy.ac.cy
www.kios.ucy.ac.cy
The attacker needs “MOM”!
www.kios.ucy.ac.cy
Attackers’ Profiles
White
Black Hat
Hat
Grey
Hat
Hackers: Act of
penetrating into a system
www.kios.ucy.ac.cy
Attackers’ Profiles
§ White Hats (or “Ethical Hackers” or “Pentesters”):
§ Seek to protect computer systems by discovering the
vulnerabilities before the “bad guys”
§ Grey Hats:
§ Normal People with knowledge of computers or that accidentally
found a vulnerability of a system
www.kios.ucy.ac.cy
Grey Hats example
www.kios.ucy.ac.cy
Security’s Holy Triad
www.kios.ucy.ac.cy
RoadMap
§ Intro to Cyber Security
www.kios.ucy.ac.cy
Cyber-Physical Systems (CPS)
Cyber-Physical System:
Large-scale, geographically dispersed
systems that utilize computing devices
and digital communication channels to
monitor and control physical
processes.
www.kios.ucy.ac.cy
Incident 1: StuxNet [2010]
Goal: Harm
centrifuges at
uranium
enrichment facility
in Iran
Attack Execution
[“Henrik Sandberg, Security of
Cyber-Physical Systems”,
“The Real Story of Stuxnet”,
IEEE Spectrum, 2013]
www.kios.ucy.ac.cy
Incident 2: Power Generators Ukraine [2015]
[Wired (www.wired.com)]
www.kios.ucy.ac.cy
Other Major Security Breach Incidents
§ Maroochy Shire – Queensland [2008]
§ 800K Liters of swage water released in the rivers and parks
§ StuxNet [2010]
§ Infiltration of the Control Systems
§ San Ysidro – California [2012]
§ 2 million gallons of swage water in Tijuana river
§ Chrysler [2015]
§ Recalls of 1.4 million vehicles
§ Hackers took control of critical parts of the car (e.g. steering wheel)
www.kios.ucy.ac.cy
Security Triad [Cardenas et al., 2008; Sandberg H., Security of Cyber-Physical Systems]
§ C – Confidentiality
§ “Privacy”
§ I – Integrity
§ “Security”
§ A – Availability
www.kios.ucy.ac.cy
Integrity vs Confidentiality in Airplanes
§ Flight Tracking
(Confidentiality)
§ Plane instruments
report 1,000 feet
lower than actual
altitude. (Integrity)
www.kios.ucy.ac.cy
Integrity vs Confidentiality in Cars
§ Braking patterns are
exposed.
(Confidentiality)
www.kios.ucy.ac.cy
Integrity vs Confidentiality in Power Stations
§ Electricity bill is
published online.
(Confidentiality)
§ Critical systems
compromised leading
to shutdown or
catastrophic failure
(Integrity)
www.kios.ucy.ac.cy
Integrity vs Confidentiality in CPS [KSI]
Airplane Plane instruments report 1,000 feet lower Flight plan is posted on the Internet.
than actual altitude.
Power Station Critical systems compromised leading to Electricity bill is published online.
shutdown or catastrophic failure
Pacemaker Shutdown and death Heartbeat becomes public
knowledge.
Home Security system is remotely disabled Contents of your fridge are leaked.
www.kios.ucy.ac.cy
Confidentiality is also important!
§ Accurate Tracking of Airplanes Attack Targets
www.kios.ucy.ac.cy
What is the Cyber-Physical Attack?
Cyber-Physical Attack:
The exploitation of a vulnerability (Software, Hardware, Data)
by an adversary, aiming to alter the behavior of physical
processes
www.kios.ucy.ac.cy
Attacks in CPS [Cardenas et al, 2008]
Physical
Actuators Sensors
System
Controller
www.kios.ucy.ac.cy
Attacks in CPS [Cardenas et al, 2008]
A5
A1
A4
Physical
Actuators Sensors
System
A2
Controller
A3
§ CPS cycle: estimation and control
Attacker more likely to go for A1-
§ A1 – A3 : Deception Attacks
A4:
§ A2 – A4: DoS Attacks 1. Not easily identifiable
§ A5: Physical Attacks (no solutions 2. Not physically dangerous
other than detecting them) 3. Not constrained by distance
www.kios.ucy.ac.cy
Security Goal for CPS
www.kios.ucy.ac.cy
Failure/Attack Detection
www.kios.ucy.ac.cy
Failures vs Attacks
§ Consider the following scenarios:
§ Component fails produces a pattern P
X P
§ Component is maliciously changed and produces pattern P
P
Impossible to distinguish benign failures from malicious alterations.
www.kios.ucy.ac.cy
Use Case: Attacks on WDN [Taormina et al., 2017]
www.kios.ucy.ac.cy
RoadMap
§ Intro to Cyber Security
www.kios.ucy.ac.cy
Vulnerabilities
§ Hardware
§ Software
§ Data
www.kios.ucy.ac.cy
Hardware Vulnerabilities
§ Denial of Service (Interruption)
§ Theft (Interception)
§ Substitution (Fabrication)
www.kios.ucy.ac.cy
Hardware Interruption - DDoS
www.kios.ucy.ac.cy
Software Vulnerabilities
§ Deletion (Interruption)
www.kios.ucy.ac.cy
Software Modification
§ Easy to do that!
§ Changing 1bit in the binary! – “off by one” errror
§ Trojan horses
§ A hidden procedure in a malicious software
www.kios.ucy.ac.cy
Software Manipulation
§ Virus
§ Specific type of trojan that clones itself and spreads its “infection”
among computers.
§ Trapdoor
§ A program with a secret entry point
§ Spywares
§ Extracts useful information about the user and send this to
unauthorized parties
www.kios.ucy.ac.cy
Data Vulnerabilities
§ Greater value than software and hardware
Data
Secure Data
www.kios.ucy.ac.cy
Vulnerabilities and Challenges in CPS
§ CPS Vulnerabilities
§ Use of multiple computers (e.g controllers)
§ Open protocol design
§ Networked
§ Use of commodity IT solutions (Windows, TCP/ip…)
§ CPS Challenges
§ Infrequent Updates
§ Strict Operational Environment
§ Legacy Systems
§ Limited Network Dynamics
www.kios.ucy.ac.cy
RoadMap
§ Intro to Cyber Security
www.kios.ucy.ac.cy
Defenses
Prevent
• block the
attack or
close the
vulnerability
Deter
Recover • Make the
• From the attack harder
attack but not
impossible
Defenses
Detect Deflect
• While it • Make
happens or another
some time target more
after attractive
www.kios.ucy.ac.cy
Important Defense Mechanics
§ Encryption
§ Confidentiality of data
§ Idea: Scramble data so they become unreadable
§ Authentication
§ Confidentiality on data access
§ Prove the ID of a node
www.kios.ucy.ac.cy
Important Defense Mechanics
§ Authorization
§ Also confidentiality on data access
§ Usually follows authentication
§ Auditing
§ Usually for integrity
§ Used for attack detection
§ Log Analysis
www.kios.ucy.ac.cy
Encryption
www.kios.ucy.ac.cy
Encryption
www.kios.ucy.ac.cy
Symmetric vs Asymmetric Encryption
§ Symmetric
Key
§ Asymmetric
Encryption Key Decryption Key
KE KD
www.kios.ucy.ac.cy
Exercise: Caesar Cipher
§ Cipher Key: replace a letter with the one x positions after it
§ Let A -> 0 … Z -> 25
§ i.e. if x = 3 then cipher(A) = A+3 = 0+3 = 3 = d
www.kios.ucy.ac.cy
Exercise: Soviet Encryption WW II
§ Cipher Key
§ Common Letters ASINTOER (“a sin to er(r)”)
§ Select a keyword
www.kios.ucy.ac.cy
Exercise: Soviet Encryption WW II
Keyword: S U N D A Y
www.kios.ucy.ac.cy
Exercise: Soviet Encryption WW II
§ Keyword: S C A R Y
§ Build the Cipher Key
§ Decrypt the following
81 4 85 90 4 90 80 97 4 0 1 90 2 3 90 2 5 5 5 87
www.kios.ucy.ac.cy
Solution: Soviet Encryption WW II
S C A R Y
0 84 4 7 95
B D E F G
80 85 5 91 96
H I J K L
81 2 88 92 97
M N O P Q
82 3 6 93 98
T U V W X
1 86 89 94 99
Z . /
83 87 90
81 4 85 90 4 90 80 97 4 0 1 90 2 3 90 2 5 5 5 .
www.kios.ucy.ac.cy
Private – Public Key Encryption
§ Alice generates 2 keys
§ Public Key
§ Private Key
Bob Alice
Share Kpub-Bob, Kpub-Alice E(Kpub-Alice, E(Kprv-Bob,D))
Kprv-Alice
Send E(Kpub-alice, E(Kprv-Bob,D))
E(Kprv-Bob,D)
Kpub-Bob
www.kios.ucy.ac.cy
Web Encryption - HTTPs
www.kios.ucy.ac.cy
Is your password secure?
www.kios.ucy.ac.cy
Let’s check it out!
www.kios.ucy.ac.cy