23
Information Security of Embedded Systems 6.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST

Information Security of Embedded Systems 6.1.2010: Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST

Embed Size (px)

Citation preview

Information Security of Embedded Systems

6.1.2010: Design of Secure Systems

Prof. Dr. Holger SchlingloffInstitut für Informatik

undFraunhofer FIRST

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 2

Happy New Year!

•Have you read today’s newspaper? banking card problem “2010” (30M€) Mars spaceship problem (???$)

•You’re in the right lecture!

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 3

Structure

1. Introductory example2.Embedded systems

engineering1. definitions and terms2. design principles

3.Foundations of security1. threats, attacks, measures2. construction of safe

systems

4.Design of secure systems1. design challenges2. safety modelling and

assessment3. cryptographic algorithms

5. Communication of embedded systems

1. remote access2. sensor networks

6. Algorithms and measures

1. digital signatures2. key management3. authentification4. authorization

7. Formal methods for security

1. protocol verification2. logics and proof

methods

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 4

Recap –Threats, Attacks, Principles

• Threats virus, worms, trojan horses mobile code, activeX

• Communication attacks link layer network layer transport layer application layer

• General construction principles fail-safe defaults, complete mediation, need-to-know, open

design, economy of mechanisms

• System construction phases PID controller

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 5

Design Challenges

• Tamper resistance, security even under physical attack

• Low processing capacities, form factor“Processing Gap”

• High energy costs,battery life“Battery Gap”

• Rapidly evolving architectures

• Engineering vs. information processing

Ravi, Raghunathan, Kocher, Hattangady: Security in Embedded Systems:Design Challenges; ACM Trans. ECS3,3,2004

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 6

Gaps

• “Processing gap” cost for security calculations increase

quicker than the available processing power• “Battery gap”

battery capacity increase and energy consumption decrease slower than security cost inflation

• “Flexibility” embedded systems difficult to upgrade, new attacks arise

continually• “Tampering”

reengineering methods and tools becoming readily available• “Assurance gap”

functional complexity increase quicker than verification technology

• “Cost” balance between security requirements and implementation costs

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 7

Security Functions

Kocher, Lee, McGraw, Raghunathan, Ravi: Security as a New Dimension in Embedded System Design; DAC 2004

• data confidentiality• data integrity• authentication

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 8

Security Concepts

• Encryption symmetric and asymmetric

ciphers, public key methods

• Access control policies• Secure hashing • Security protocols

e.g., SSL, IPSec, VPNs

• Digital Signatures certificates biometrical data

• Digital Rights Management watermarking,

steganography

• Cryptographic hardware accelerators

• Embedded processor support for cryptography

• Multicore for security• Open design• Redundancy• Timing analysis• Electromagnetic

resistance• Capacitors

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 9

Embedded Security Pyramid

Knezevic, Rozic and Verbauwhede: Design Methods for Embedded Security

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 10

Another Model of Mobile Security

•Areas of consideration

•“Abstract to concrete” property areas target areas application areas

Sun, Howie, Koivisto, and Sauvola: A Hierarchical FrameworkModel of Mobile Security

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 11

Property Theory Layer

• Objectives confidentiality integrity availability

• Attacks intrusion orientation sources of attack attacked targets attack methods

• Mechanisms protection, cryptography, authentication,

monitoring…

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 12

Limited Targets Layer

•Networking

•Computers, OS

•Multimedia

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 13

Classified Applications Layer

•Samples more?

•Discussion of the two models?

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 14

Safety Modelling and Assessment

“Common Criteria for Information Technology Security Evaluation”

• Specification, implementation and evaluation of security requirements Results to be comprehensible, comparable and traceable comparable to IEC61508 for safety assessment

• International standard (ISO/IEC 1540, 1998-2009) Replaces predecessors

- TCSEC (Trusted Computer Eval. Criteria, 1980)- ITSEC (Information Technology Security Evaluation Criteria, 1991)

Mutual acknowledgement between countries V3.1 released July 2009

• Certification for systems by accredited institutions in Germany: BSI

• Sources available at http://www.commoncriteriaportal.org/

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 15

Certified Products

• Network and Network related Devices and Systems• Operating systems

• Access Control Devices and Systems• Biometric Systems and Devices• Boundary Protection Devices and Systems

• ICs, Smart Cards and Smart Card related Devices and Systems• Key Management Systems

• Data Protection systems, Databases• Detection Devices and Systems

• Products for Digital Signatures• Trusted Computing

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 16

Structure

•Part 1: general model glossary, foundations of evaluation, protection

profiles, security targets

• Part 2: functional requirements catalogue of recommendations connections between threats, goals and

requirements

• Part 3: assurance requirements guideline on evaluation methodology and

process protection profile and security target evaluation

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 17

Key concepts

• Target Of Evaluation (TOE) system to be evaluated

• Protection Profile (PP) security requirements for a class of security devices

• Security Target (ST) security properties of the TOE; may refer to one or more PPs

• Security Functional Requirements (SFRs) individual security functions provided by a product

• Security Assurance Requirements (SARs) measures taken during development

• Evaluation Assurance Level (EAL) numerical rating of an evaluation; EAL 1-7

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 18

Functional Security Classes

• functionality classes FAU: security audit FCO: communication FCS: cryptographic support FDP: user data protection FIA: identification and authentication FMT: security management FPR: privacy FPT: protection of the security functions FTA: TOE access FTP: trusted path/channels

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 19

Components of Security Classes

•e.g. FCS: cryptographic support

key generation

key distribution

key access

key destruction

specified algorithm

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 20

Evaluation assurance levels in CC

(EAL1) functionally tested “provides meaningful increase in assurance over an

unevaluated IT product or system” development according to normal engineering

standards(EAL2) structurally tested

requires “developer testing, vulnerability analysis, and independent testing”

formulation of security goals, threats, informal architecture plan, test documentation

(EAL3) methodically tested and checked more complete testing, tamper resistance during

development informal implementation plan, test result evaluation

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 21

Evaluation assurance levels in CC

(EAL4) methodically designed, tested, and reviewed requires design descriptions, partial implementation check,

informal model; correlation between design and implementation

(EAL5) semiformally designed and tested semiformal design descriptions, structured architecture,

covert channel analysis; formal security model

(EAL6) semiformally verified design and tested vulnerability analysis, structured implementation,

environment controls explanation instead of description

(EAL7) formally verified design and tested formal representations and correspondences, comprehensive

testing mathematical proofs of algorithms

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 22

Evaluation methods

• Analysis and checking of processes and procedures

• Checking that processes and procedures are being applied

• Analysis of the correspondence between design representations

• Analysis of design representations against the requirements

• Verification of proofs• Analysis of the guidance documents• Analysis of tests and test results• Functional and penetration testing

6.1.2010Embedded Security © Prof. Dr. H. Schlingloff 2010 23

Critique

+ Certification possible for many TOEs+- Generality of approach+ Evaluation maintenance

- Evaluation usually complex and costly (~106$)

- Lenghthy process; certified products outdated- No direct increase in security by assessment - Not for open source and agile development