+ All Categories
Home > Documents > Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf ·...

Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf ·...

Date post: 14-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
33
Security of Safety-Critical Devices Usable Privacy and Security 1 Frankie Catota and Adam Durity April 8, 2014
Transcript
Page 1: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Security of Safety-Critical Devices

Usable Privacy and Security 1

Frankie Catota and Adam Durity April 8, 2014

Page 2: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Outline

q  Introduction q Medical devices

q  Risks q  Defense Approaches q  Perception

q  Vehicle safety q  Other safety-critical areas q  Economics of safety-critical devices

Usable Privacy and Security 2

Page 3: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Safety-Critical Devices

q  “Safety-critical systems are those systems whose failure could result in loss of life, significant property damage, or damage to the environment.” – John C. Knight

q  Security in Safety-Critical Systems: maintaining safety in the presence of an active attacker

q  Medical Systems q  Implantable Medical Devices (IMD)

Usable Privacy and Security 3

Page 4: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Implantable Medical Devices (IMD)

Usable Privacy and Security 4

healthcareitsystems.com

q  Embedded computers q  350K Pacemakers & 173K Cardiac Defibrillators in 2006

Page 5: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Operational Requirements

q  Collect information (diagnostics) q  Disable IMD before conducting surgeries q  Reprograming q  Access in emergency situations (authentication)—

rapid and reliable access --challenge q  Constraints

q  Limited capacity of battery (replacement -necessitates surgery). Implications: injuries and death

q  Microcontrollers

Usable Privacy and Security 5

Page 6: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Risks in Medical Devices

q  Vulnerabilities q  Authentication

q  Attack Vectors q  Passive q  Active

q  Risks / threats q  DoS q  Changes in configuration q  Replace medical records -- someone having a different

operation q  Injuries, death

6 Usable Privacy and Security

Page 7: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Pacemakers

Usable Privacy and Security 7

Networking changes the treat model

Page 8: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Hacking Tests (1)

q  2008: wireless access to a combination heart defibrillator and pacemaker (within two inches of the test gear) –Kevin Fu

q  Disclose personal patient data q  Reprogram IMD to shut down and to deliver jolts of

electricity that would potentially be fatal q  Authors: “The risks to patients now are very low”

Usable Privacy and Security 8

Page 9: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Hacking Tests (2)

2011-2012-2013 q  Hacking Insulin Pumps

2013 -- Black Hat /Defcon: q  “Implantable medical devices: hacking humans”

q  At 30 feet by compromising their pacemaker q  Transmitter to scan for and interrogate individual

medical implants q  Security techniques for manufacturers

-- ioactive.com

Usable Privacy and Security 9

-- insulinpump.com

Page 10: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Defense Approaches

q  How do we achieve resistance to attacks? q  Fault-tree analysis --What can go wrong? q  How strong a security policy should be?

q  Security q  Safety

Usable Privacy and Security 10

Page 11: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Access Control: Authentication Methods

q  Passwords: how to make them available? q  Tattooed passwords (visible, UV visible) q  Bracelet

q  Biometrics (face recognition) q  Smart Cards q  Touch-to-access policy q  Key-based systems q  Shields

q  Necklace q  Computational wristband

Usable Privacy and Security 11

-- Figures from Denning et al.

Page 12: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Authentication: Touch to Access Policy (1)

q  Physiological value EGG as an authenticator

q  IMD authentication based on Inter-pulse Interval (IPI )

q  Extract uncorrelated random bits

Usable Privacy and Security 12

Electrocardiography (ECG) Wave form

- Rostami et al.

Page 13: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Authentication: Touch to Access Policy (2) Independent synchronous readings --two steps: q  Establishing a secure

channel (TLS) q  Programmer - server q  IMD – client (avoid burden of

PKI) q  Mutual authentication

q  IMD reveals α (randomness of α)

q  Programmer reveals β q  Privacy

q  Medical data is not revealed –only α

q  Detect attacks from deviations from (alpha)

q  Promiscuous mode (IPI flat –Heart attacks)

Usable Privacy and Security 13

H2H operation

- Rostami et al.

Page 14: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

IMD Shield

Usable Privacy and Security 14

- IMDShield -mit.edu

q  Proxy (messages exchanges) q  Authentication + encryption (channel)

Page 15: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

IMD Shield - Implementation

q  Jammer design (full duplex radio)

Usable Privacy and Security 15

- S. Gollakota et al. MIT

Page 16: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Wristbands / Alert Bracelets

q  Safety in emergencies q  Security & Privacy under adversarial

conditions q  Battery life

Usable Privacy and Security 16

Page 17: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Wristbands / Alert Bracelets

q  Protection is granted while wearing the bracelet.

q  Remove to gain access to the IMD q  Inform patients about malicious

actions – But not preventive q  Authentication + symmetric encryption q  Disadvantages

q  Relies on the patient wearing the bracelet q  Reactive q  No desired scenarios (bracelet close but

not found) q  Cognitive effects on patients

Usable Privacy and Security 17

--Denning et al.

Page 18: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Perceptions of Authentication Methods (1)

Concerns about safety and privacy q  Hospitals not having correct equipment to scan

tattoos and UV-visible tattoos (emergencies) q  Visual indicator of patients condition (something is

wrong). Personal dignity. q  Carrying one more device q  Aesthetics

q  Wristbands (especially). “Mockups are unaesthetic” q  Tattoos

q  Mental and physical inconvenience q  Cultural and historical associations (concentration

camps, drunks) q  Tattoos –negative associations

q  Self-Image –consistence with desired image

Usable Privacy and Security 18

Page 19: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Perceptions of Authentication Methods (2)

q  Notification availability –strong negative reactions q  Medical information q  No concerned about someone getting access to

their IMD change configurations q  Some do not have the perception of a real risk

--“be my guess”

Usable Privacy and Security 19

Page 20: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Evaluation Results

Password and Body Modification (n=11)  

Mockup System   Liked   Disliked   Would Choose  Medical Alert Bracelet   0%   27%   0%  

Visible Tattoo   9%   55%   9%  

UV-Visible Tattoo   18%   27%   18%  

Usable Privacy and Security 20

Data from T. Denning et al.

Page 21: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Group Activity

q  Get into groups and discuss other possible attack vectors against any medical system. A frame to discuss about it may be: q  Vulnerability q  Attack (actor + motivation) q  Consequences

Usable Privacy and Security 21

Page 22: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobiles

q  Modern automobile q  Numerous interconnected

microcontrollers q  Some luxury models have

more than 70 controllers q  Many safety systems (e.g. airbag, brakes, seatbelt pre-

tensioners, traction and stability control)

q  Controller Area Networks (CAN) enable various controllers to communicate q  All interface with the required OBD-II diagnostics port

q  Since 2007, all automobiles have tire pressure monitoring systems (TPMS)

Usable Privacy and Security 22

Page 23: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobiles: Attack Vectors

These numerous controllers and other systems are all potential security attack vectors q  Checkoway et al. examined external vectors

q  Indirect physical access q  Short-range wireless q  Long-range wireless

q  Do vulnerabilities exist within these vectors? q  What can an attacker do upon gaining access?

Usable Privacy and Security 23

Page 24: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobile: Indirect Physical Access

q  OBD-II q  Diagnostics port used by mechanics to check vehicle

systems q  Most auto shops use a wired or wireless “pass-thru” device

to connect PC to OBD-II port q  Entertainment system

q  Fully integrated into CAN for the purpose of providing user feedback (e.g., chime, camera, proximity sensors)

q  Checkoway et al. q  Created an audio file which, when played through the

entertainment system, exploits a vulnerability in the playback code to send arbitrary CAN packets to the bus

q  Demonstrated vulnerabilities in pass-thru device which could be used to attack every vehicle inspected with the device

Usable Privacy and Security 24

Page 25: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobile: Short-range Wireless

q  Bluetooth q  Remote Keyless Entry q  Tire Pressure Monitoring System (TPMS)

q  Checkoway et al. q  Exploited vulnerabilities in glue code between vehicle

and popular embedded implementation of Bluetooth stack

q  Bluetooth device must be paired q  Trojan on driver’s device q  Determined attacker with extended proximity

Usable Privacy and Security 25

Page 26: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobile: Long-range Wireless

q  Broadcast q  FM RDS q  Satellite radio q  GPS

q  Cellular

q  Checkoway et al. q  Reverse engineered common telematics data protocol q  Call the car, bypass authentication, inject malicious

code for command and control

Usable Privacy and Security 26

Page 27: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Automobiles: The Future

q  Dedicated Short-range Communications (DSRC) q  Vehicle to Vehicle (V2V) for collision avoidance

Usable Privacy and Security 27

US Department of Transportation

Page 28: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Other Safety-Critical Systems

q  Infrastructure q  Power grid q  Water supply

q  Transportation q  Aviation

q  Military devices

Usable Privacy and Security 28

Page 29: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Other Safety-Critical Systems: Infrastructure

q  Supervisory Control and Data Acquisition (SCADA) q  SCADA systems can be used in a wide variety of

industrial contexts q  Water purification q  Power generation (including nuclear)

q  Stuxnet q  Known to target certain SCADA systems q  Propagated via sneaker-net (i.e., USB key)

Usable Privacy and Security 29

Page 30: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Other Safety-Critical Systems: Transportation

Aviation q  Like cars, airplanes use embedded systems

q  Avionics – electronic systems in the cockpit q  Boeing 787 Dreamliner

q  wireless control systems

q  Air Traffic Control q  Regulated by FAA

Usable Privacy and Security 30

Page 31: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Vulnerabilities within Safety-Critical Systems

q  Systems comprised of multiple components provided by multiple entities

q  Components often suffer from common vulnerabilities (e.g., no buffer overflow protection, no guard against user-provided content)

q  Manufacturer’s do not have resources to conduct full security analysis of every component

q  However, components are often treated as fully-trusted components of the system

Usable Privacy and Security 31

Page 32: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

Economics of Security in Safety-Critical Systems

q  Gaynor et al. compared competition between hospitals to patient data protection practices q  Found that greater competition within a given hospital

market breeds looser data protection practices q  Instead of security, budget is spent in ways that make

the hospital more appealing to would-be patients q  Consider Highmark and UPMC here in Pittsburgh

q  Conclusion: in highly competitive markets, security will be sacrificed in favor of consumer visible features that affect the purchase decision q  FDA: implementing cybersecurity requirements q  NHTSA: Vehicle Electronics and Emerging Technologies

Division

Usable Privacy and Security 32

Page 33: Security of Safety-Critical Devicescups.cs.cmu.edu/courses/ups-sp14/Lecture23.pdf · Vulnerabilities within Safety-Critical Systems ! Systems comprised of multiple components provided

References M. Rostami et al., Heart-to-Heart (H2H): Authentication for Implanted Medical Devices

T. Denning et al., Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices

T. Denning et al., New Directions for Implantable Medical Device Security

Gollakota et al. They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices

K. Fu and J. Blum, “Controlling for cybersecurity risks of medical device software,” Commun. ACM, vol. 56, no. 10, p. 35, Oct. 2013.

S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in USENIX Security Symposium, 2011.

S. S. Clark, B. Ransford, and K. Fu, “Potentia est Scientia: Security and Privacy Implications of Energy-Proportional Computing Shane,” in HotSec, 2012.

M. S. Gaynor, M. Z. Hydari, and R. Telang, “Is Patient Data Better Protected in Competitive Healthcare Markets?,” in WEIS, 2012, no. Weis.

<spectrum.ieee.org/podcast/biomedical/devices/hacking-pacemakers>

<groups.csail.mit.edu/netmit/IMDShield>

<blog.ioactive.com/2013/07/las-vegas-2013.html>

forbes.com <hacking-insulin-pumps-and-other-medical-devices-reality-not-fiction>

Usable Privacy and Security 33


Recommended