29
The Dark Ages of IoT Security Prof. Stefano Zanero, PhD

Smau Milano 2015 - Stefano Zanero

  • Upload
    smau

  • View
    627

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Smau Milano 2015 - Stefano Zanero

The Dark Ages of IoT Security

Prof. Stefano Zanero, PhD

Page 2: Smau Milano 2015 - Stefano Zanero

Agenda

What is the Internet of Things

IoT (in)security

A real-world case study

The (scary) future of IoT security

Conclusions

Page 3: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things ?

Page 4: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

The IoT is the network of physical objects or "things" embedded with electronics, software,

sensors, and network connectivity, which enables these objects to collect and exchange data

Source: Wikipedia

Page 5: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

Things are physical objects

Things are connected with existing network infrastructure

Things collect data – physical world’s probes (!)

Things can be remotely controlled

Things exchange data with (some)thing

Page 6: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

(personal) things

Page 7: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

(home) things

Page 8: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

(industrial) things

Page 9: Smau Milano 2015 - Stefano Zanero

What is the Internet of Things

(medical) things

Page 10: Smau Milano 2015 - Stefano Zanero

IoT (in)security

Page 11: Smau Milano 2015 - Stefano Zanero

IoT (in)security

What is information security ?

Confidentiality

Integrity

Availability

The so called CIA paradigm (or triad) What about IoT security?

Page 12: Smau Milano 2015 - Stefano Zanero

IoT (in)security

IoT Security != Device Security

Page 13: Smau Milano 2015 - Stefano Zanero

IoT (in)security

Why? Think about mobile security world ! Mobile security is

The security of the mobile device

The security of installed apps

The security of 3rd party apps’ back-end systems

The security of pre-installed apps’ back-end (e.g., apps

store)

Now back to the IoT universe..

Page 14: Smau Milano 2015 - Stefano Zanero

IoT (in)security

Defining attack surface

“the attack surface describes all of the differentpoints where an attacker could get into

a system, and where they could get data out”

What about IoT attack surface ?

Source: OWASP

Page 15: Smau Milano 2015 - Stefano Zanero

IoT (in)security

EcosystemAccess Control

Device Memory Device Physical Interfaces

Device Web Interface

Device Firmware

Device Network Services

Administrative Interface

Local Data Storage

Cloud Web Interface

Third-party Backend APIs

Update Mechanism

Mobile Application

Vendor Backend APIsEcosystem

Communication Network Traffic

Page 16: Smau Milano 2015 - Stefano Zanero

IoT (in)security

Now, let’s talk about vulnerabilities

No alien technology, no extra-terrestrial bugs

OWASP defines an ad-hoc list for IoT Welcome to the OWASP IoT Top Vulnerabilities

It represents a list of vulnerabilities not risks

In 2014 the list was a canonical Top 10

Currently 13 vulnerabilities are included

Page 17: Smau Milano 2015 - Stefano Zanero

IoT (in)security

1. Username Enumeration

2. Weak Passwords

3. Account Lockout

4. Unencrypted Services

5. Two-factor Authentication

6. Poorly Implemented Encryption

7. Update Sent Without Encryption

8. Update Location Writable

9. Denial of Service

10. Removal of Storage Media

11. No Manual Update Mechanism

12. Missing Update Mechanism

13. Firmware Version Display and/or Last Update Date

Page 18: Smau Milano 2015 - Stefano Zanero

IoT (in)security

Slightly random thoughts on IoT security

IoT is “happening” with a rapidly (chaotic) development without appropriate considerations on security

More devices == more data == more cyber attacks

“Things” are probes in everyone’s life

Smart TV, cameras, thermostats are literally “watching” us !

Devices firmware update will be ruled by market – see ya security in 18 months?

Page 19: Smau Milano 2015 - Stefano Zanero

Real-world case studies

Page 20: Smau Milano 2015 - Stefano Zanero

Real-world case studies

Source: HP research on smart watches

Page 21: Smau Milano 2015 - Stefano Zanero

Real-world case studies

Source: Rapid7 research on baby monitoring systems

Page 22: Smau Milano 2015 - Stefano Zanero

Real-world case studies

Source: HP research on home security systems

Page 23: Smau Milano 2015 - Stefano Zanero

The (scary) future of IoT security

Page 24: Smau Milano 2015 - Stefano Zanero

The (scary) future of IoT security

Skynet is waiting

Page 25: Smau Milano 2015 - Stefano Zanero

The (scary) future of IoT security

50 BILLIONobjects by 2020

Source: Cisco

Page 26: Smau Milano 2015 - Stefano Zanero

The (scary) future of IoT security

Complexity. That’s the problem.

The Internet of Things is wild, open and no one will pay for secure (every)thing

Vendors are urgently called to implement solution secure by design to reduce the risks

An extensive standardization on “how things should be securely implemented” could be truly a panacea

Page 27: Smau Milano 2015 - Stefano Zanero

Conclusions

Page 28: Smau Milano 2015 - Stefano Zanero

Conclusions

We are brewing a perfect cyber-physical storm with unfathomable consequences

We are using complex networks of smart devices on which we increasingly rely for critical infrastructures and safety-critical systems, without humans in the loop

We have issues with zero-days as well as forever-days

We need significant engineering and research efforts to get this done and avert the storm

Page 29: Smau Milano 2015 - Stefano Zanero

Thank [email protected]