5 IoT Security
5 IoT Security
Internet of Things
1
Outline
2
Biplab Sikdar
Mirai Botnet Attack
3
Singtel network
Biplab Sikdar
Mirai Botnet Attack
4
Biplab Sikdar
Mirai Botnet Attack
5
Biplab Sikdar
Mirai Botnet Attack
6
Biplab Sikdar
Mirai Botnet Attack
7
cameras
username: root and password:
xc3511
password hardcoded into device
firmware
Biplab Sikdar
Mirai Botnet Attack
8
Biplab Sikdar
Mirai Botnet Attack
9
Biplab Sikdar
Mirai Botnet Attack
10
Biplab Sikdar
Possible Attacks on IoT
11
Biplab Sikdar
Examples of (Insecure) IoT Devices
12
IP Camera
Router
Baby monitor
Smart home
Network Attached Storage
Smart cars
Biplab Sikdar
Example 1: ChargePoint EV Charger
13
Biplab Sikdar
Example 1: ChargePoint EV Charger
14
Biplab Sikdar
Example 1: ChargePoint EV Charger
15
Panda board:
Stores the firmware on a
Flash NAND chip by
Micron
Includes a JTAG debug
socket
Use OpenOCD scripts and
the JTAG socket to read
and write NAND content
Biplab Sikdar
Example 1: ChargePoint EV Charger
16
Hardware analysis:
Main board: measures line and reference voltages, checks
the energy flow direction, energy pulse data, and line
frequency.
Daughter board: contains a ATMega microcontroller, a
tamper sensor, and a 1 KB EEPROM and collects energy
usage information, tamper data, and board ID.
The microcontroller can be used to re-enable JTAG, and re-
enable write access for on-chip memories.
Biplab Sikdar
Example 2: Smart Meters
19
Duaghter board:
Biplab Sikdar
Example 2: Smart Meters
20
Biplab Sikdar
Example 3: Smart Home
21
Haier SmartCare:
A smart device to control and read
information from sensors and
actuators in a user’s home
Connections through ZigBee
To connect to the device, users need
to download a mobile app
Users create an account through the
manufacturer’s cloud service to view
their and interact with their devices
from outside of their local network
Biplab Sikdar
Example 3: Smart Home
22
Hardware:
Processor: TI AM3352BZCZ60
(contains ARM Cortex A8 and
supports Linux and Android)
Device has a UART connection
that can be used to read serial
data from the device
This connection can be used to
view its start up sequence,
interrupt and modify the boot
process, and open a shell
Biplab Sikdar
Example 3: Smart Home
23
Biplab Sikdar
Example 3: Smart Home
24
root password
Biplab Sikdar
Example 4: IP Camera
25
Biplab Sikdar
Example 4: IP Camera
26
Registration:
First configure the camera to use the home wireless network
Binding: can change password and other configurations (e.g.,
resolution) via a web page of the camera (host = IP address
of camera, http://host/setup.asp?r=20141126)
Camera and controller register with two remote servers, i.e.,
registration server and command relay server (port 8760)
The packets transmitted between the controller, camera, and
remote servers are obfuscated (by doing a constant right
shift on all characters) instead of encrypted
During registration, all the packets use UDP
Biplab Sikdar
Example 4: IP Camera
27
Biplab Sikdar
Example 4: IP Camera
28
Biplab Sikdar
Example 4: IP Camera
29
Registration Step 3:
On receiving the response from command relay server, the
camera sends a packet with a command value “2” and new
UUID to the registration server
It is used to inform the registration server the fact that it has
registered with the command relay server.
Biplab Sikdar
Example 4: IP Camera
30
Registration Step 4:
Camera sends two successive packets to registration server
The first packet (with code value of “3000”) informs the
registration server that the camera is online
The second packet (with code value of “1010”) carries
camera information (e.g., camera model, firmware version)
Biplab Sikdar
Example 4: IP Camera
31
Registration Step 4:
Registration server responds with a packet with a code value
of “1020”
The camera repeats STEP 1 to STEP 4 around every 20
minutes to inform the registration server that the camera is
online
Biplab Sikdar
Example 4: IP Camera
32
Biplab Sikdar
Example 4: IP Camera
33
Biplab Sikdar
Example 4: IP Camera
34
Biplab Sikdar
Example 4: IP Camera
35
Biplab Sikdar
Example 4: IP Camera
36
Biplab Sikdar
Example 4: IP Camera
37
Biplab Sikdar
Example 4: IP Camera
38
Biplab Sikdar
Example 4: IP Camera
39
Biplab Sikdar
Example 4: IP Camera
40
Biplab Sikdar
Example 4: IP Camera
41
Biplab Sikdar
Top IoT Vulnerabilities: 1
42
Biplab Sikdar
Top IoT Vulnerabilities: 1
43
Biplab Sikdar
Top IoT Vulnerabilities: 1
44
Biplab Sikdar
Top IoT Vulnerabilities: 2
45
Default credentials:
Most home and enterprise IoT devices ship with default
passwords which can be brute forced in minutes or hours.
Attackers with limited skill can compromise an IoT device.
Manufacturers often don’t provide the ability to the user to
change the login credential
Example: Mirai botnet (IoT devices with open ports for
common services that used default credentials)
Some of the devices which were affected by Mirai had to
even recall their devices since they had no external way to
change the password on their IoT devices.
Biplab Sikdar
Top IoT Vulnerabilities: 3
46
Hardcoding issues:
Sensitive and confidential information are often hardcoded
in IoT device firmware: private certificates, API keys,
passwords to online databases and servers
Anyone with access to the firmware can see these values.
Firmware analysis can also expose staging URLs,
development environment details, and encryption keys.
Some of the common hardcoding issues can be detected by
simply running an automated script which would extract the
file system from the firmware and look through all
individual files and folders for sensitive information.
Biplab Sikdar
Top IoT Vulnerabilities: 4
47
Biplab Sikdar
Top IoT Vulnerabilities: 5
48
Biplab Sikdar
Top IoT Vulnerabilities: 6
49
Biplab Sikdar
Other Security Issues
50
Biplab Sikdar
Why are IoT Devices Targeted?
51
Biplab Sikdar
Why is Security an Issue?
52
Biplab Sikdar
IoT Security Challenges
53
Biplab Sikdar
Example: Trane
54
Biplab Sikdar
Example: Trane
55
Lessons:
All software can contain vulnerabilities
Public not informed for months
Vendors may delay or ignore issues
Product lifecycles and end-of-support
Patching IoT devices may not scale in large environments
Biplab Sikdar
IoT Devices are Easy to Find
56
Biplab Sikdar
IoT Attack Surface Areas
57
Biplab Sikdar
IoT Attack Surface Areas
58
Device memory
Device firmware
Device physical interfaces
Device network services
Device web interface
Local data storage
Vendor backend APIs
Mobile application
Biplab Sikdar
Minimizing the Attack Surface
59
“Trustworthy Products”
Implement Trusted Device Policy
Access control
Mature behavioral based anomaly detection
Decrease “Mean Time to Detect” and “Mean Time to
Contain”
Instrument the network – Fireamp, NGIPS, Netflow
Segment the network – control zones, security group
tags, data-aware
Biplab Sikdar
Goal of Computer Security
60
Biplab Sikdar
A Secure System
62
Biplab Sikdar
A Secure System
63
Biplab Sikdar
A Secure System
64
Biplab Sikdar
So What is a Secure System?
65
Biplab Sikdar
Threat Models in Practice
66
Biplab Sikdar
Developing a Threat Model
67
Biplab Sikdar
Developing a Threat Model
68
Biplab Sikdar
Developing a Threat Model
69
Mobile: complications
Biplab Sikdar
Developing a Threat Model
70
Biplab Sikdar
High Level Overview
71
1 2 3 4
Decide on Build your Enumerate Decide on
scope dataflow threats mitigations
diagrams
Biplab Sikdar
Creating a Data Flow Diagram
72
Decompose the
system into a series of
processes and data
flows
Explicitly identify trust
boundaries
Biplab Sikdar
Example
73
Biplab Sikdar
Identify Threats from Data Flow
74
Biplab Sikdar
Mapping Threats to Assets
75
Biplab Sikdar
Countermeasures
76
Do nothing
Remove/turn off the feature
Warn the user
Counter the threat with Operations
Accountability
Separation of Duties
Counter the threat with Technology
Change in Design
Change in Implementation
There is no “catch all” countermeasure
Biplab Sikdar
IoT System Security
87
Biplab Sikdar
Solutions for IoT System Security
88
Biplab Sikdar
Solutions for IoT System Security
89
Biplab Sikdar
Solutions for IoT System Security
90
Biplab Sikdar
Device: Hardware
92
Biplab Sikdar
Device: Hardware
93
More secure.
Biplab Sikdar
Device: Operating System
94
Biplab Sikdar
Device: Operating System
95
Biplab Sikdar
Device: Operating System
96
Security of Android:
Greatly reduced attack surface due to Android’s sandbox,
program signature mechanism, user permissions, and
TrustZone.
Android-based program reinforcement has become more
advanced with the development of mobile operating
systems in recent years.
More device operating systems have migrated from
embedded Linux to Android.
Biplab Sikdar
Device: Operating System
97
Biplab Sikdar
Device: Operating System
98
Access control.
File encryption.
Communication encryption.
Biplab Sikdar
Internet
100
Biplab Sikdar
Cloud
101
Both IoT devices and mobile apps interact with the cloud
platform through the network.
Cloud platform can be used for data storage, data calculation,
and data display.
According to the privacy data protection laws of various
countries (e.g., EU’s GDPR1), data needs to be encrypted and
data authorized by the user can be stored, and deleted when
the data retention period expires.
In addition to the traditional information security construction,
there are two additional considerations for IoT:
Biplab Sikdar
Cloud
102
Biplab Sikdar
Ukraine Power Grid Attack: 2015
103
Biplab Sikdar
What is a CPS/ICS
104
Biplab Sikdar
Industrial Control System Overview
105
Sensor(s) +
Actuator(s) +
Controller(s)
Biplab Sikdar
Legacy ICS
107
Proprietary
Complete vertical solutions
Customized
Specialized communications
Wired, fiber, microwave, dialup, serial, etc.
100s of different protocols
Slow; e.g. 1200 baud
Long service lifetimes: 15–20 years
Not designed with security in mind
Biplab Sikdar
Internet
Modern ICS
108
Enterprise
Enterprise Network Enterprise
Network
Workplaces Optimization
Firewall
IP Suite
Third Party
Application Mobile
Server Operator
Services
Network
Connectivity Historian Application Engineering
Server Server Server Workplace
Control
Network
Serial, OPC
Redundant
or Fieldbus
Device Network
Third Party
Controllers,
Servers, etc.
Serial RS485
Biplab Sikdar
Power Grid: Comm and Control
109
Biplab Sikdar
Ukraine Power Grid Attack: 2015
112
Biplab Sikdar
Ukraine Power Grid Attack: 2015
113
Biplab Sikdar
Ukraine Power Grid Attack: 2015
114
Biplab Sikdar
Ukraine Power Grid Attack: 2015
115
Biplab Sikdar
Ukraine Power Grid Attack: 2015
116
Biplab Sikdar
Ukraine Power Grid Attack: 2015
117
Stage 1:
Reconnaissance:
coordinated
Weaponization and/or Targeting:
Biplab Sikdar
Ukraine Power Grid Attack: 2015
118
Biplab Sikdar
Attack Step: 1
119
Biplab Sikdar
Ukraine Power Grid Attack: 2015
120
addresses
Actions: harvest credentials, escalate privileges, move
laterally, identify VPN connections and avenues from the
business network into the ICS network.
Act:
Using stolen credentials, adversary entered network
Biplab Sikdar
Attack Step: 3
122
Biplab Sikdar
Attack Step: 4
123
Biplab Sikdar
Attack Step: 5
124
Biplab Sikdar
Attack Step: 6
125
Biplab Sikdar
Ukraine Power Grid Attack: 2015
126
Stage 2:
Primary attack: SCADA hijack with malicious operation to
open breakers
Supporting attacks:
substations
Biplab Sikdar
Attack Step: 6
127
Biplab Sikdar
Known Attacks
128
Stuxnet: Iran
Lansing BWL
Ransomware Saudi Aramco Cyberattack
Biplab Sikdar
Possible Attacks
129
H. Nguyen et al. "Impact of Signal Delay Attack on Voltage Control for Electrified Railways". IEEE TENCON,
Macau, China, November 2015.
Biplab Sikdar
Possible Attacks
130
D. Niyato, et al. "Impact of packet loss on power demand estimation and power supply cost in smart grid." IEEE
Wireless Communications and Networking Conference (WCNC), 2011.
Biplab Sikdar
ICS Security Risks
131
Biplab Sikdar
Implications of ICS Security Risks
132
Loss of production
Penalties and lawsuits
Loss of: trust, market value
Physical damage
Environmental damage
Injury, loss of life
Biplab Sikdar
Securing a CPS/ICS
133
No single solution
Defense-in-Depth
Perimeter protection
Firewall, IPS, VPN, AV, Host IDS, Host AV, DMZ
Interior Security
Firewall, IDS, VPN, AV, Host IDS, Host AV, IEEE P1711
Biplab Sikdar
Defense in Depth
134
Internet
IT Stuff
Enterprise Network IT Stuff
VPN FW
Proxy AV IPS
Scan Host IPS Host AV Log Mgmt IPS
IDS Event Mgmt FW
Control Network Partner
NAC Reporting 62351 Site
Host IDS Host AV VPN
FW
VPN P1711
IDS FW
AV Field Site
Scan Field Site NAC Field Site
Biplab Sikdar
Security issues in CPS/ICS
135
Biplab Sikdar
Devices with Unpatched Software
138
Biplab Sikdar
Host Anti-virus
140
Biplab Sikdar
Authentication
141
Biplab Sikdar
Auditing and Logging
142
Biplab Sikdar
Inappropriate Use of ICS Desktops
144
Biplab Sikdar
Inadequate Internal Monitoring
145
Biplab Sikdar
Unmanned Field Sites
146
backdoor to the
control center
Biplab Sikdar
3rd Party Access
147
Biplab Sikdar
Other Issues
149
Biplab Sikdar
Adversaries
150
Script kiddies
Hackers
Organized crime
Disgruntled insiders
Competitors
Terrorists
Hactivists
Eco-terrorists
Nation states
Biplab Sikdar
Threat Model
151
Biplab Sikdar
Defending a CPS/ICS
152
Biplab Sikdar
Defense in Depth
153
Internet
IT Stuff
Enterprise Network IT Stuff
VPN FW
Proxy AV IPS
Scan Host IPS Host AV Log Mgmt IPS
IDS Event Mgmt FW
Control Network Partner
NAC Reporting 62351 Site
Host IDS Host AV VPN
FW
VPN P1711
IDS FW
AV Field Site
Scan Field Site NAC Field Site
Biplab Sikdar
SP99/Purdue Model of Control
154 Level 5 Enterprise Network
Enterprise
Email, Intranet, etc. Site Business Planning and Logistics Network
Zone
Level 4
Terminal Patch AV
Services Mgmt Server
DMZ
Historian Web Services Application
(Mirror) Operations Server
Level 1 Batch
Control
Discrete
Control
Continuous
Control
Hybrid
Control
Basic
Control
Level 0 Process
Biplab Sikdar
Logical Architecture
155
Biplab Sikdar
DMZ Implementation
157
NAT Security
Appliance
DMZ LAN 2 With
Multiple
DMZ LAN 3 Ports
Routing
DMZ LAN 4 FW
IPS
Anti-Virus
Proxy
Biplab Sikdar
Control Zone: Logical View
160
DMZ
Level 1 Batch
Control
Discrete
Control
Continuous
Control
Hybrid
Control
Basic
Control
Level 0 Process
Biplab Sikdar
Control Zone: Design Principles
161
FW FW
Level 3
L3
L3
IDS
SPAN Gigabit
Scan Control
L2 L2 Zone
Level 2 dot1q Trunks
QoS, Shaping, Policing
Port Security
10/100
Level 1
Biplab Sikdar
Control Zone: Ring
163
FW FW
Level 3
L3
L3
IDS
SPAN Gigabit
Scan Control
L2 dot1q Trunks L2 Zone
Level 2
QoS, Shaping, Policing
Port Security
10/100
Level 1
Biplab Sikdar
Power Grid: Perimeter Protection
164
Firewall
Site-to-site VPN
IDS/IPS
Client VPN
DMZ
Proxy
Network AV
Host IDS/IPS
NAC
Biplab Sikdar
Power Grid: Interior Protection
165
IDS
Port Scan
Vuln Scan
Firewall
NAC
Firewall
SCADA VPN SCADA VPN
Port Scan
IDS
Biplab Sikdar
Power Grid: Monitoring, Logging
166
Log Managed
Analyze Security
Report
Compliance
Biplab Sikdar
ICS/CPS Standards Efforts
167
NERC CIPs
NIST Smart Grid Interoperability Standards Project
NIST SP800-82
NIST SP800-53
NIST PCSRF Protection Profiles
AMI-SEC
ISA SP99
ODVA
IEEE P1711 (AGA 12) -- serial SCADA encryption
Biplab Sikdar
Slide Credits
171
Biplab Sikdar