SlideShare uma empresa Scribd logo
1 de 32
Security of Cyber-Physical Systems
Stefano Zanero, PhD
Assistant Professor, Politecnico di Milano
Stefano Zanero
Buongiorno!
I'm an assistant professor
at Politecnico di Milano,
My laboratory deals with
Novel, Emerging
Computing System
Technologies, and
encompasses the system
security research efforts
Black Hat review board
member
AIPSI/ISSA International
member & ISSA
International Director
Stefano Zanero
08/12/123
Scope of this talk
This talk deals with security of cyber-physical
systems
In particular, with the vulnerabilities at the
separation layer of such systems
Stefano Zanero
08/12/124
Cyber-physical systems
Evolution of the
traditional embedded
systems for control
E.g. SCADA systems,
avionics, vehicular
control and
infotainment, “smart
grid”
Do you know what's the
“naked” CPS on the
left?
Stefano Zanero
Vulnerabilities
In information security, a vulnerability is a weakness
which allows to reduce a system's information
assurance
More generally, a vulnerability is a weakness in a
system that makes it susceptible to being damaged,
or more generally makes it unfit to withstand some
external condition
We should not confuse the existence of a
vulnerability with the existence of a threat (e.g. an
attacker), or with the existence of one or more
specific exploits for that vulnerability
Stefano Zanero
Security as managing risks
All (information) systems are vulnerable
This is not a self-justifying mantra, it's a basic fact of
life: invulnerability, just like perfection, is but an
illusion
Vulnerabilities, their exploitability and the existence
and prevalence of threats combine with the potential
of damage to create risks
Security is the discipline of managing risk reducing it
to a tolerable level, balancing the costs
The issue of securing critical systems is that it is
very difficult to gauge the product of very low
probabilities times very high potential damage
Stefano Zanero
Fact check
Want to check with you some facts
Fact 1: CPS are increasingly involved in critical
infrastructures and safety-critical systems
Fact 2: CPS are increasingly becoming control
loops closed without humans in the middle
Fact 3: CPS are evolving towards complex
networks of complex systems, rather than single,
embedded, simple systems
Fact 4: threat level by actors likely to act against
these systems is constantly on the rise
Stefano Zanero
Fact 1: critical systems
“… potential (cyber)attacks against
network infrastructures may have
widespread and devastating
consequences on our daily life: no more
electricity or water at home, rail and plane
accidents, hospitals out of service”
Viviane Reding
VP of European Commission
Stefano Zanero
9
Train signals...
Stefano Zanero
Connected cars...
10
Stefano Zanero
The power grid...
11
Stefano Zanero
Fighter planes...
12
Stefano Zanero
08/12/1213
Fact 2: no human in the middle
Stefano Zanero
In the real world...
Stefano Zanero
Algorithmic trading fails
~40% of share orders in Europe by algorithmic trading; 5
yrs ago, 20%. In the U.S. 37%. (src: Tabb Group)
Knight trading is just the latest failure
Svend Egil Larsen (Norwegian trader) in 2007 reversed
the trading algorithm of Timber Hill, a unit of US-based
Interactive Brokers, found a flaw and exploited it for
$50,000 (U.S.) in a few months. Not guilty, btw.
Deutsche Bank’s trading algorithms in Japan took out a
$182-billion stock position by mistake in 2010
“Flash crash” in 2010, Dow Jones Industrial Average
swung hundreds of points in 20 minutes – exacerbated
by trading algorithms kicking in
Stefano Zanero
Fact 3: complexity of networks
Stefano Zanero
Interconnection...
Stefano Zanero
… and convergence
Stefano Zanero
Interconnection (too much of it)
Stefano Zanero
08/12/1220
Fact 4: rising threats
All the data comes
from the Internet
Security Threat Report
2011
Stefano Zanero
Find the differences...
China's Chengdu J-
20 fighter (circa oct.
2010) vs. Northrop
YF-23 (1994)
Remember that
Northrop was one of
the first targets of the
APT (Advanced
Persistent Threat)
campaign in 2009
Suggestive, isn't it?
Stefano Zanero
It's not just about the business
Stefano Zanero
The slippery slope of cyberwar
Stuxnet: designed to
sabotage Iran's nuclear
facilities
Duqu: discovered a few
months later, possibly
created earlier, same
platform as Stuxnet;
uses zero-day;
designed to collect data
on the Iranian nuclear
program (which ended
up in the ends of UN)
Stefano Zanero
And then came the flame
Flamer: enormous malware
specimen discovered in
2012 by ITU; intelligence
gathering; encryption zero
day (!); component link to
Stuxnet (!!)
Gauss: similar to the others
in many way, includes
banking trojan and an
encrypted payload which
wasn't cracked yet
No comment to the
above image (detailing
diffusion of Flame) is
probably needed.
Stefano Zanero
What next?
Shamoon: a very different
beast, targeting critical files
from a specific company
(Saudi Aramco)
Still, a targeted attack with
usage of signed driver
component like Flamer
Overwrote critical files on
30.000 machines (¾) on the
corporate network with a
burning American flag
Claimed by unknown
“Cutting Sword of Justice”
group on Pastebin
What's next?
Stefano Zanero
Facts checked!
Fact 1: CPS are increasingly involved in critical
infrastructures and safety-critical systems
Fact 2: CPS are increasingly becoming control loops
closed without humans in the middle
Fact 3: CPS are evolving towards complex networks
of complex systems
Fact 4: threat level by (state/nonstate)-actors likely
to act against these systems is constantly on the rise
All of this leads, at the same time, to increasing
attack surfaces, vulnerability exposure, threat
prevalence, potential damage
What about defense then?
Stefano Zanero
Where we are: legacy woes
Stefano Zanero
Forever day bugs
Zero-day: an unknown
vulnerability exploited by an
attacker
Forever day: an old,
beaten-to-death
vulnerability still around
Most CPS are change
averse, and thus prone to
forever day bugs
RuggedCom is in good
company with ABB,
Schneider Electric, and
Siemens
RuggedCom forever day:
Known username,
fixed password easy to crack,
impossible to disable
Stefano Zanero
Where we are going: hardware attacks
Rakshasa is a fully functional bootkit
resident in RAM and invoked by a
seemingly sane BIOS/firmware
Stefano Zanero
The perfect storm
Vulnerabilities arising at
the boundary where
digital and physical
connect
The trading algorithms
are a first example
Smart grid
vulnerabilities are
another excellent
example of possible
positive feedback loops
between the two realms
Stefano Zanero
Conclusions
We are brewing a perfect digital storm with unfathomable
consequences
We are using complex networks of digital systems to
control critical infrastructures and safety-critical systems,
without humans in the loop
Threat level by (state/nonstate)-actors likely to act
against these systems is constantly on the rise, and we
are actively contributing to legitimize this
We have issues with zero-days as well as forever-days,
and we have significant upcoming threats (malicious
hardware and interstitial layer threats)
We need significant engineering and research efforts
to get this done and avert the storm
Stefano Zanero
Questions?
Thank you for your
attention!
You can reach me at
stefano.zanero@polimi.it
Or just tweet @raistolo
Our research on these topics has
been partially funded by the
European Commission under FP7
project SysSec, and by Italy's
PRIN project TENACE

Mais conteúdo relacionado

Mais procurados

Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 

Mais procurados (20)

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
 
Cyber security
Cyber securityCyber security
Cyber security
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 

Semelhante a Smau Bologna 2013 Stefano Zanero

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
ClubHack
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on Snort
Francis Yang
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
oreo10
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
Tracy Berry
 

Semelhante a Smau Bologna 2013 Stefano Zanero (20)

The red book
The red book  The red book
The red book
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
0857290053.pdf
0857290053.pdf0857290053.pdf
0857290053.pdf
 
Security
SecuritySecurity
Security
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Attact evolution
Attact evolutionAttact evolution
Attact evolution
 
Research of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on SnortResearch of Intrusion Preventio System based on Snort
Research of Intrusion Preventio System based on Snort
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 

Mais de SMAU

Mais de SMAU (20)

L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...L'intelligenza artificiale per il marketing automation: come automatizzare le...
L'intelligenza artificiale per il marketing automation: come automatizzare le...
 
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales NavigatorIl supporto IA nella Lead Generation con Linkedin e Sales Navigator
Il supporto IA nella Lead Generation con Linkedin e Sales Navigator
 
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazioneSMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
SMAU MILANO 2023 | Intrapreneurship: I dipendenti come driver dell'innovazione
 
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
SMAU MILANO 2023 | TECNOLOGIE IMMERSIVE E METAVERSO: SOLUZIONI INNOVATIVE PER...
 
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtechSMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
SMAU MILANO 2023 | SMAU MILANO 2023 | Le nuove frontiere dell'ESGtech
 
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
SMAU MILANO 2023 | AI: Un Alleato Innovativo per l'Omnichannel Customer Exper...
 
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
SMAU MILANO 2023 | 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 La nuova frontiera della formazio...
 
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
SMAU MILANO 2023 | COME PROGETTARE SOLUZIONI CIRCOLARI E MODELLI DI BUSINESS ...
 
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social MediaSMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
SMAU MILANO 2023 | Google Business Profile tra SEO e Social Media
 
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
SMAU MILANO 2023 | Il PM incontra la proprietà intellettuale: pianificare la ...
 
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
SMAU MILANO 2023 | Il neuromarketing: solo 8 secondi per catturare l’attenzio...
 
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
SMAU MILANO 2023 | Collaborazioni vincenti: Come le startup possono creare pa...
 
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggiSMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
SMAU MILANO 2023 | Funnel Hacking: massimizzare il ROAS in 7 passaggi
 
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
SMAU MILANO 2023 | Una reputazione che ti precede: come il personal storytell...
 
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
SMAU MILANO 2023 | Come scalare una produzione video: il caso “Vongola Lupino...
 
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
SMAU MILANO 2023 | IA Generativa per aziende - come addestrare i modelli ling...
 
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
SMAU MILANO 2023 | L'intelligenza artificiale per davvero (facciamola sul ser...
 
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...SMAU MILANO 2023 |  Personal Branding: come comunicare in maniera efficace la...
SMAU MILANO 2023 | Personal Branding: come comunicare in maniera efficace la...
 
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
SMAU MILANO 2023 | What's Next? Rivoluzioni industriali, intelligenza artific...
 
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbotsSMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
SMAU MILANO 2023 | SMAU MILANO 2023 | Intelligenza Artificiale e chatbots
 

Último

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Smau Bologna 2013 Stefano Zanero

  • 1. Security of Cyber-Physical Systems Stefano Zanero, PhD Assistant Professor, Politecnico di Milano
  • 2. Stefano Zanero Buongiorno! I'm an assistant professor at Politecnico di Milano, My laboratory deals with Novel, Emerging Computing System Technologies, and encompasses the system security research efforts Black Hat review board member AIPSI/ISSA International member & ISSA International Director
  • 3. Stefano Zanero 08/12/123 Scope of this talk This talk deals with security of cyber-physical systems In particular, with the vulnerabilities at the separation layer of such systems
  • 4. Stefano Zanero 08/12/124 Cyber-physical systems Evolution of the traditional embedded systems for control E.g. SCADA systems, avionics, vehicular control and infotainment, “smart grid” Do you know what's the “naked” CPS on the left?
  • 5. Stefano Zanero Vulnerabilities In information security, a vulnerability is a weakness which allows to reduce a system's information assurance More generally, a vulnerability is a weakness in a system that makes it susceptible to being damaged, or more generally makes it unfit to withstand some external condition We should not confuse the existence of a vulnerability with the existence of a threat (e.g. an attacker), or with the existence of one or more specific exploits for that vulnerability
  • 6. Stefano Zanero Security as managing risks All (information) systems are vulnerable This is not a self-justifying mantra, it's a basic fact of life: invulnerability, just like perfection, is but an illusion Vulnerabilities, their exploitability and the existence and prevalence of threats combine with the potential of damage to create risks Security is the discipline of managing risk reducing it to a tolerable level, balancing the costs The issue of securing critical systems is that it is very difficult to gauge the product of very low probabilities times very high potential damage
  • 7. Stefano Zanero Fact check Want to check with you some facts Fact 1: CPS are increasingly involved in critical infrastructures and safety-critical systems Fact 2: CPS are increasingly becoming control loops closed without humans in the middle Fact 3: CPS are evolving towards complex networks of complex systems, rather than single, embedded, simple systems Fact 4: threat level by actors likely to act against these systems is constantly on the rise
  • 8. Stefano Zanero Fact 1: critical systems “… potential (cyber)attacks against network infrastructures may have widespread and devastating consequences on our daily life: no more electricity or water at home, rail and plane accidents, hospitals out of service” Viviane Reding VP of European Commission
  • 13. Stefano Zanero 08/12/1213 Fact 2: no human in the middle
  • 14. Stefano Zanero In the real world...
  • 15. Stefano Zanero Algorithmic trading fails ~40% of share orders in Europe by algorithmic trading; 5 yrs ago, 20%. In the U.S. 37%. (src: Tabb Group) Knight trading is just the latest failure Svend Egil Larsen (Norwegian trader) in 2007 reversed the trading algorithm of Timber Hill, a unit of US-based Interactive Brokers, found a flaw and exploited it for $50,000 (U.S.) in a few months. Not guilty, btw. Deutsche Bank’s trading algorithms in Japan took out a $182-billion stock position by mistake in 2010 “Flash crash” in 2010, Dow Jones Industrial Average swung hundreds of points in 20 minutes – exacerbated by trading algorithms kicking in
  • 16. Stefano Zanero Fact 3: complexity of networks
  • 18. Stefano Zanero … and convergence
  • 20. Stefano Zanero 08/12/1220 Fact 4: rising threats All the data comes from the Internet Security Threat Report 2011
  • 21. Stefano Zanero Find the differences... China's Chengdu J- 20 fighter (circa oct. 2010) vs. Northrop YF-23 (1994) Remember that Northrop was one of the first targets of the APT (Advanced Persistent Threat) campaign in 2009 Suggestive, isn't it?
  • 22. Stefano Zanero It's not just about the business
  • 23. Stefano Zanero The slippery slope of cyberwar Stuxnet: designed to sabotage Iran's nuclear facilities Duqu: discovered a few months later, possibly created earlier, same platform as Stuxnet; uses zero-day; designed to collect data on the Iranian nuclear program (which ended up in the ends of UN)
  • 24. Stefano Zanero And then came the flame Flamer: enormous malware specimen discovered in 2012 by ITU; intelligence gathering; encryption zero day (!); component link to Stuxnet (!!) Gauss: similar to the others in many way, includes banking trojan and an encrypted payload which wasn't cracked yet No comment to the above image (detailing diffusion of Flame) is probably needed.
  • 25. Stefano Zanero What next? Shamoon: a very different beast, targeting critical files from a specific company (Saudi Aramco) Still, a targeted attack with usage of signed driver component like Flamer Overwrote critical files on 30.000 machines (¾) on the corporate network with a burning American flag Claimed by unknown “Cutting Sword of Justice” group on Pastebin What's next?
  • 26. Stefano Zanero Facts checked! Fact 1: CPS are increasingly involved in critical infrastructures and safety-critical systems Fact 2: CPS are increasingly becoming control loops closed without humans in the middle Fact 3: CPS are evolving towards complex networks of complex systems Fact 4: threat level by (state/nonstate)-actors likely to act against these systems is constantly on the rise All of this leads, at the same time, to increasing attack surfaces, vulnerability exposure, threat prevalence, potential damage What about defense then?
  • 27. Stefano Zanero Where we are: legacy woes
  • 28. Stefano Zanero Forever day bugs Zero-day: an unknown vulnerability exploited by an attacker Forever day: an old, beaten-to-death vulnerability still around Most CPS are change averse, and thus prone to forever day bugs RuggedCom is in good company with ABB, Schneider Electric, and Siemens RuggedCom forever day: Known username, fixed password easy to crack, impossible to disable
  • 29. Stefano Zanero Where we are going: hardware attacks Rakshasa is a fully functional bootkit resident in RAM and invoked by a seemingly sane BIOS/firmware
  • 30. Stefano Zanero The perfect storm Vulnerabilities arising at the boundary where digital and physical connect The trading algorithms are a first example Smart grid vulnerabilities are another excellent example of possible positive feedback loops between the two realms
  • 31. Stefano Zanero Conclusions We are brewing a perfect digital storm with unfathomable consequences We are using complex networks of digital systems to control critical infrastructures and safety-critical systems, without humans in the loop Threat level by (state/nonstate)-actors likely to act against these systems is constantly on the rise, and we are actively contributing to legitimize this We have issues with zero-days as well as forever-days, and we have significant upcoming threats (malicious hardware and interstitial layer threats) We need significant engineering and research efforts to get this done and avert the storm
  • 32. Stefano Zanero Questions? Thank you for your attention! You can reach me at stefano.zanero@polimi.it Or just tweet @raistolo Our research on these topics has been partially funded by the European Commission under FP7 project SysSec, and by Italy's PRIN project TENACE