ESW/IoT Course Lecture
covering security related
research questions around IoT
           By Sachin Gaur
            25.10.2021
Thinking like an attacker or an artist: Modern
Art
             Hardware device along with sensors and
IoT Stack    radio interface
                           Firmware to enable
                           connectivity
            User Interface ( Mobile, Smart Speakers, BCI)
                 Backend Cloud Computing for data
                 storage and network intelligence
                        Intelligence from Network of
                        Smart Devices
Camera as an example to Illustrate the same
Camera as a Device                     Camera as a connected         Camera as an intelligent
• Installed at the door for security   device                        device
  usecase                              • Check the stream anytime,   • Unlock doors for approved faces
• Local access and limited storage       anywhere                    • Buy premium intelligence features
                                       • Unlimited storage             and keep getting more value from
                                                                       the same investments
We are surrounded by systems around us
which acquire data?
We are surrounded by systems around us
which acquire data?
We are surrounded by systems around us
which acquire data?
Unsuspecting photocopier!
The next big thing: voice activated devices?
IRTF RFC 8576 : IoT Security State of the Art
and Challenges
                Figure taken from the RFC document
Now reflect on this statement?
“People will eventually be unable to know how
many devices they are carrying, which ones are
currently connected and what data they contain.
Is the data personal or not? Who is able to access
it? Who is able to perform software update
without the user’s knowledge? “
- Aurelien Francillon, Eurecom, France
The formal work on IoT security is fast
catching up but not yet there
The formal work on IoT security is fast
catching up but not yet there
The formal work on IoT security is fast
catching up but not yet there
The formal work on IoT security is fast
catching up but not yet there
Lets explore some research
ideas?
Idea is not violate someone’s intellectual property but to get inspired and develop
our own original approach
Power
fingerprinting
                 https://research.kudelskisecurity.com/2019/10/16/power-analysis-to-the-people/
An example of power fingerprinting!
Replacing the firmware / server code once in
a while?
How SCIT works?
Self- Cleaning Intrusion Tolerance is a patented technique for providing ultra-
low intruder persistence time. We constantly restore systems to a pristine
state to remove malware and rob intruders of the time needed to plan and
launch attacks. SCIT does not require changes to existing information
systems, applications, or security protocols to deliver new high level of
protection. When intruders get in, you need to throw them out as quickly as
possible without waiting to figure out what they are up to. SCIT-MTD (SCIT
Moving Target Defense) assumes that while intrusions are inevitable, the
bigger problem is that intruders are in your systems for a very long time
watching how your system works. Once they are in, they learn how your
systems operate, where your most valuable assets are located, and how to
get your data out of your system under your security radar. SCIT disrupts the
hacker processes and makes it difficult for hackers to succeed.
Dealing with legacy devices?
• You cannot update them
• The vulnerabilities are known
• The exploits are also available
• What if the device we are talking about is not cheap? If it is an Xray
  machine, MRI machine will you throw it away once you know you
  cannot update it?
Monitoring the IoT Traffic
      What could be a potential solution in the long
      term?
https://www.nist.gov/news-events/events/2021/09/workshop-cybersecurity-labeling-programs-consumers-internet-things-iot
Another non technical solution could be….
Not to buy devices but rent them!
Rent the most secure device always.
Open Discussion
• What is your view on security of IoT Devices?
• What is that most popular device that you would like to investigate
  for Confidentiality, Integrity and Availability?
• Any approaches that you will like share and discuss