SESSION ID: ECO-T07R Endpoints in the New Age: Apps, Mobility, and the Internet of Things Benjamin Jun CTO Chosen Plaintext Partners @BenjaminJun #RSAC v18 Lots of connected devices! @BenjaminJun #RSAC PCs IP phones Mobile phones Consumer Electronics Machine-to-Machine Source: Cisco 2 @BenjaminJun #RSAC Endpoint security today Monitor Recover Manage React to anomalous data/behavior Respond quickly to 0 day System repair Centralized policy enforcement Deployment management Endpoint Security Platforms Market The Radicati Group, Inc. (2014) 3 @BenjaminJun #RSAC Endpoint security today Complexity hurts defense (a) (b) Platform – new onesgenerated have poor security[9].(Left) is a correctly predicted sample, (ce Figure 5:diversity Adversarial examples for AlexNet ference between correct image, image/ device predicted/ incorrectly magnified by 10x (values shifted by Lots of apps, smeared acrossand cloud IoT clamped), (right) adversarial example. All images in the right column are predicted to be an “ ostrich camelus” . Average distortion based on 64 examples is 0.006508. Plase refer to ht t p: / / goo. gl / for full resolutionhas images. The examples are strictly randomly chosen. ThereRube is notGoldberg any postselection Archives Machine learning limits Machine recognition cuts through complexity …but lousy against skilled adversaries Result: race-to-update! Attackers are more subtle (a) + deep (APT) HARD to tune false positive vs. false negative “car” “NOT (b)car” delta Intriguing properties of neural networks, Szegedy et al Figure 6: Adversarial examples for QuocNet [10]. A binary car classifier was trained on top of the features without fine-tuning. The randomly 4 chosen examples on the left are recognized correctly as c What lies ahead… Internet of Things Device Federation #RSAC Application Portability Complex Trust Domains @BenjaminJun #RSAC The Internet of Things The physical world is becoming a type of information system [with] sensors and actuators embedded in physical objects... When objects can both sense the environment and communicate, they become tools for understanding complexity and responding to it. – McKinsey & Company 6 Challenge: Break physical stuff, at scale Enron fakes grid transactions to manipulate market (2001) Stuxnet targets programmable logic controller (2010) Siemens Simatic S7-315 The devices: Radio Ranges IOActive demo’d vulnerabilities in Washington DC traffic management system (2014) Hacking US Traffic Control Systems Cesar Cerrudo, IOActive 7 @BenjaminJun #RSAC Place (GPS) Challenge: Time and Place IoT policies sensitive to time/location @BenjaminJun #RSAC App logic, pricing, proximity assessment, identity, pairing, DRM, … Today’s approaches not private, spoofable Captured RQ-170 Sentinel CJ6 GPS Jammer Prediction: Chipset jammerstore.com On the Requirements for Captured RQ-170 Sentinel Successful GPS Spoofing Attacks cores for environment attestation Tippenhauer, Pöpper, Rasmussen, Capkun Christian Science Monitor, 12/15/2011 Independent CPU maintains GPS + time history Digitally sign data, traceable to module security certification #RSA 28 8 Christian Science Monitor 12/15/2011 @BenjaminJun #RSAC Challenge: IoT device maintainabiliy Unmanaged IoT hard to update, no clear owner, no mgmt $ But today’s endpoint security relies on updates! IoT infrastructure has 5x longer field life than mobile device System components have short lived support Chipset SW team builds Board Support Package (BSP) ODM builds device functionality Product vendor makes customization AhnLab V3 Mobile Version Report 150101 Date Jan/2015 Protection Protection against malicious Android apps Detection of a representa tive set of malicious 2,950 samples used apps discovered in the last 4 weeks (AV-TEST January reference set) Usability Protecti on Score Impact of the security Performance: The Performance: The software on the usability app does not impact app does not slow False warnings during False warnings during 981 samples used of the device the battery life January Industry average down the device during app does not generate 1,932 samples used normal usage too much traffic installation and usage installation and usage of legitimate apps from Google Play of legitimate software Store from third party app stores Features Usability Score Further important security Anti-Thef t (Remote-L Call Blocker: Block / Locate): Locate, or stolen and/or against phishing or observe the activity to SD-card or cloud of children on the device AV-TEST Independent IT-Security Institute Android Testing Methodology (2013) Encryption: Any kind 0 0 January device when it is lost for unwanted content of malicious websites Features to control data can be saved Lock or Wipe your or unknown numbers messages and/or mails Safe Browsing: Protection Parental Control: 0 0 6.0/6.0 features ock / Remote-W ipe calls from specific Message Filter: Filter Backup: Personal of encryption is supported Other features: storage (e.g. device encryption , SD-card encryption or VPN) Network Managem ent 9 Industry average 6.0/6.0 Malware detection test: “We use only recent malware, which is not older than 4 weeks.” Performance: The …will the last one in the building patch the vulnerability? During January 2015 we evaluated 31 mobile security products for used the most current Android using their version of all products default settings. We always for the testing. They query their in-the-clou were allowed to update d services. We focused themselves at any time on malware detection and positives. Products and usability, including had to demonstrate performance and false their capabilities using all components and protection layers. 2.1 Platform Android 5.0.1 Copyright © 2015 by AV-TEST GmbH, Klewitzst r. 7, 39112 Phone +49 (0) 391 Magdeburg, Germany 60754-60, Fax +49 (0) 391 60754-69, www.av-test.org What lies ahead… Internet of Things Device Federation #RSAC Application Portability Complex Trust Domains @BenjaminJun #RSAC Device federation M2M peer cooperation To assess device environment For control + data flows When one device proxies a human Need to discover, create, manage, and authenticate endpoint identities 11 Fridge: Marjan Lazarevski S-beam: wonderhowto.com …best practice for device federation? @BenjaminJun #RSAC Problem: wifi-enroll a new printer 1. New printer defaults as open wifi AP 2. “HP Auto Wireless Connect” 3. Runs on your PC Scrapes wifi access code from OS Connects to printer AP and gives access code to printer Printer joins your wireless network! Genius or Scary? 12 www.wikihow.com Authentication standards filling out… Fast IDentity Online (FIDO) Alliance OAuth, OpenID People authentication Leverages security features on user device Agnostic to device authentication technology API access (robot) authentication Client enrolled and given a key …not M2M / endpoint solutions! Need device discovery, P2P connection 13 FIDO @BenjaminJun #RSAC @BenjaminJun #RSAC Ease of 1st Connection Decentralized device federation Embedded agent Proximity & web-of-trust CryptoManager Enroll to local hub Enroll to central service Degree of Centralization Web of trust: www.linux.com Bluetooth: cloudlink.soasta.com CryptoManager: rambus.com S-beam: wonderhowto.com What lies ahead… Internet of Things Device Federation #RSAC Application Portability Complex Trust Domains @BenjaminJun #RSAC Workspaces of the future Instant global connectivity Cross-domain collaboration Hierarchical control “Mobile [as a distinction] is dead …I expect to use any screen” – Matias Duarte VP of Design, Google 16 @BenjaminJun #RSAC Application portability Seamless sessions across independently managed devices. Securely “throw” app to different device Immediate response Minimal admin (BYOD, friends house, hotel) Application bound to user, not device When app and data really matter! 17 Attackers target interoperability controls Example: HDCP content pipe @BenjaminJun #RSAC “High Bandwidth Digital Copy Protection” Protects digital content, interoperability Ease of use: Fast, offline, any-to-any No one device contains global secret but a group of 40 devices reveals it! Commercial exploit! A Cryptanalysis of the High-bandwidth Digital Content Protection System (Crosby, Goldberg, Johnson, Song, Wagner) 18 image from www.hdmi.org App control is bound to keys... manage them well! @BenjaminJun #RSAC Apple Airplay protects digital content, interoperability, and user binding Fast, offline, any-to-any Pipe + direct connection to Internet sources Security design RSA keypairs for different roles Global keys extracted shairport, James Laird 19 Portability requires centralized policies Cloud sync helps data portability Sync + console greatly improve management tools But security of distributed data only as strong as weakest link Controls are coarse @BenjaminJun #RSAC Centralization helps. But device security is the limiting reagent! 20 www.dropbox.com (accessed 2/13/2015) Portability requires sandboxing … but are software sandboxes robust? The Great Cloud Reboot of 2014 @BenjaminJun #RSAC Content as threat vector Xen Security Advisory CVE2014-7188 21 https://www.nccgroup.com/en/blog/2015/02/abusing-blu-ray-players-pt-1-sandbox-escapes/ Portability requires secure UI … but we can’t even do this locally! @BenjaminJun #RSAC User interface == communication channel Isolation, privacy, integrity Many groups working on this Guiding lights? SE Linux has right focus on interfaces PIN pad standards (DUKPT) Um, separated UI is good for security! …did iMessage just kill SMS 2-factor? 22 http://blog.billguard.com/2014/07/look-easily-can-thwart-even-sophisticated-atm-skimmer/ What lies ahead… Internet of Things Device Federation #RSAC Application Portability Complex Trust Domains The good old days (pre-2010) @BenjaminJun #RSAC Hierarchical structure Device Admin = Owner = Root OS/BIOS in charge Policies via endpoint security product Reality: “Possession is nine tenths of the law” 24 www.historyforkids.net @BenjaminJun #RSAC Many cooks in the kitchen! Entities Privileges Device owner User(s) Applications Application developer App store BYOD administrator(s) Mobile carrier / system operator OS vendor Device manufacturer Chip manufacturer Run app Unlock data Read location info Application keys Access to crash logs Platform attestation Allow SW update Debug unlock Privileged developer hooks Peripheral authentication Encrypted key store 25 @BenjaminJun #RSAC Pressure on trust boundaries App doesn’t trust user Nobody trusts the software App doesn’t trust root User cannot touch app’s keys No single administrator: multiple, limited authorities Auditable privilege limits 26 @BenjaminJun #RSAC Well intentioned but limited Red/black isolation too simplistic Sandboxes incomplete, make developers lazy Key rolling w/o device robustness? TPM attestation not for complex SW 27 eventwristbands.com Infineon TPM overview, 2008 Docker One ring to rule them all? @BenjaminJun #RSAC Multiple “owners”, transparent limits, privilege transfers, situational override, auditable logs and limits Not trusted: Root / OS / vendor / govt Platform enforces data/program domains Privilege handoffs over device lifecycle Can remotely audit system attributes Enforced in HW, not by OS 28 Chart: Credo Construction #RSAC Healthy Endpoints @BenjaminJun #RSAC Endpoint foundation What gets to run on the platform? Boot / code authentication Secure debug lock Do my secrets remain opaque? Application partitioning Hardware-based secure key storage UI App App OS / TrustZone / Hypervisor Hardware Am I in the real world or the matrix? Environment attestation Peripheral authentication 30 Secure Key / ID store + manager Crypto @BenjaminJun #RSAC Trust from the top down DB Device enrollment App deployment & updates System audit & risk management Online revocation Policy management DB App server UI App server App App OS / TrustZone / Hypervisor Hardware Secure Key / ID store + manager 31 Crypto @BenjaminJun #RSAC Trust meets in the middle Device Mfg. Server DB Identity + key provisioning Authentication service Policy management Security updates DB App server UI App server App App OS / TrustZone / Hypervisor Identity + key management Sandboxed secrets Partitioning of critical state Reliability & integrity Hardware Secure Key / ID store + manager 32 Crypto Apply what you have learned Near term Mid term Understand endpoint security systems (walk show floor!) Appreciate where your roadmap deviates from your endpoint tools Use available security building blocks! Long term Advocate for platform improvements 33 @BenjaminJun #RSAC Endpoints In the New Age Questions? @ Benjamin Jun [email protected] Internet of Things Device Federation #RSAC Application Portability Complex Trust Domains
© Copyright 2026 Paperzz