46
Jeannette M. Wing Corporate Vice President Microsoft Research Annual Computer Security and Applications Conference Los Angeles, CA 9 December 2015 Crashing Drones and Hijacked Cameras: CyberPhysical meets CyberTrust

Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Jeannette M. Wing

Corporate Vice PresidentMicrosoft Research

Annual Computer Security and Applications ConferenceLos Angeles, CA9 December 2015

Crashing Drones and Hijacked Cameras:CyberPhysical meets CyberTrust

Page 2: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 3: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 4: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 5: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 6: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 7: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 8: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 9: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 10: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

They have a computational core that interacts with the physical world.

Cyber-physical systems are engineered systems that require tight conjoining of and

coordination between the computational (discrete) and the physical (continuous).

Trends for the future

• Cyber-physical systems will be smarter and smarter.

• More and more intelligence will be in software

• More and more connectivity and data flow

Page 11: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 12: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 13: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Trustworthiness in Cyber-Physical Systems

Page 14: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 15: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Challenge 1:

Reasoning about Continuous and Discrete

Challenge 2:

Uncertainty in Environment

Challenge 3:

Sensors and Actuators Can Fail

Page 16: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Computable Reals: A Fundamentally Hard Problem

“A real number is computable if its digit sequence can be produced by some

algorithm or Turing machine. The algorithm takes an integer n > 1 as input and

produces the n-th digit of the real number's decimal expansion as output. “ [Turing

1936]

Fact: While the set of real numbers is uncountable, the set of computable numbers is

only countable and thus almost all real numbers are not computable.

Page 17: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Computable Reals: Verification Challenge

On the one hand:

A real number a is said to be computable if it can be approximated by some

computable function in the following manner: given any integer n > 1, the function

produces an integer k such that:

On the other:

The computable numbers include many of the specific real numbers which appear in

practice, including all real algebraic numbers, as well as e, , and many other

transcendental numbers.

k-1 k+1n n

< a <

Page 18: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Uncertainty at Multiple Levels

Secure OS

Robust Sensing

Correct Control

High-level Planning

Sensor noise, and complex missions

Safe despite limited power, external disturbances,

Page 19: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

System = (State + Control) || Environment

Not very robust to changes in system properties, weight, aging of rotors, etc.

Limited Battery Power: Typically less than 20 minutes

Not enough computational power on board

Not very robust to changes in environment or disturbances e.g., wind, obstacles

yaw

pitch

roll

State =(not directly observed)

Control = RPM of the motors

Page 20: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Safe Control Under Uncertainty

Optimal control: minimize cost on deviation from reference + cost on control.

Subject to: We are safe!

Page 21: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 22: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

FBI warns of Internet of Things risksWhat could go wrong? The bureau's Internet Crime

Complaint Center lays out a laundry list of horrors.

Security will be critical to the success or

failure of Internet of Things

Skateboards, drones and your

brain: everything got hacked At Defcon in Las Vegas, hackers gather

to show off the latest vulnerabilities.

That’s why last weekend was just full of

bad news

Flying hacker contraption hunts other

drones, turns them into zombies

Man Hacks Monitor,

Screams at Baby

Stuxnet: A wake-up call for

nuclear cyber security

Page 23: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 24: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 25: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 26: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Device identity in hardware

Page 27: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 28: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 29: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 30: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 31: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Built for low power and limited computing resources

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 32: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Secure configuration

Security protocols and encryption

Secure storage

Secure boot

Device identity in hardware

Page 33: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 34: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

FBI warns of Internet of Things risksWhat could go wrong? The bureau's Internet Crime

Complaint Center lays out a laundry list of horrors.

Security will be critical to the success or

failure of Internet of Things

Skateboards, drones and your

brain: everything got hacked At Defcon in Las Vegas, hackers gather

to show off the latest vulnerabilities.

That’s why last weekend was just full of

bad news

Flying hacker contraption hunts other

drones, turns them into zombies

Stuxnet: A wake-up call for

nuclear cyber security

Man Hacks Monitor,

Screams at Baby

Page 35: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

… the appropriate collection and processing of

information about a data subject by a data holder

and the flow of information between data holders.

social norms, context,

ethical values, company

policies, legal rules,

individual preferences

Page 36: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Data Collection Data Management

Analyze

Share with

Partners

Insights

Collaborative

Learning

Privacy Preservation Policies

Page 37: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Anonymized

DataCollection Data Management

Analyze

Share with

Partners

Insights

Collaborative

Learning

Privacy Preservation Risks

x

Policy

Compliance?

Page 38: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Data Collection Data ManagementAnalyze

Share with

Partners

Insights

Collaborative

Learning

Privacy Preservation Policies and TECHNOLOGIES

Differential Privacy Data Map New Encryption Protocols++

Page 39: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Netflix users

Mass. Governor Weld

Credit Card metadata aggregate cell phone data

Big Data report

“Anonymization is increasingly by the very techniques that are being developed for many legitimate applications of big

data. In general easily defeated, as the size and diversity of available data grows, the likelihood of being able to

re‐identify individuals (that is, re‐associate their records with their names) grows substantially. While anonymization may

remain somewhat useful as an added safeguard in some situations, approaches that deem it, by itself, a sufficient

safeguard need updating”.

Page 40: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

• Technique that enables learning about

Distribution with Pepe’s data

Distribution without Pepe’s data

• Privacy is achieved by adding noise eitherto data prior to collection or to the results of queries against pristine databases

Page 41: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Specification

Verification

ScaleCompliance?

Data Collection

And Management

Page 42: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Encode Refine

Code analysis

Checker

Annotated

Code

Legalease Policy

Potential violationsFix

CodeUpdate Grok

Developer annotations

Page 43: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet
Page 44: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Data Inventory

Annotate code + data with policy data types

Source labels propagated via data flow graph

Process 1

Dataset A Dataset B

Dataset C

Dataset FDataset E

Process 2

Process 3

Dataset D

Process 5

Dataset J

Process 6

Process 4

Dataset H Dataset I

Dataset G

NewAcct

Login

Check

Hijack

GeoIP

Check

Fraud

Reporting

Name Age IPAddress IDX

Hash

Country

Timestamp Hash

IDX

IDX

D. E. Denning. “A lattice model of secure information flow”

Page 45: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

How can we build cyber-physical systems

that people can bet their lives on?

Page 46: Crashing Drones and Hijacked Cameras ...The bureau's Internet Crime Complaint Center lays out a laundry list of horrors. Security will be critical to the success or failure of Internet

Thank you!