Europe dedicated to IoT security 40 experts Security watch, incident response, security audits, reverse engineering, … We have our own dedicated lab in Paris Our IoT CERT and its activites 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 3
chain Integrating security into projects Software and hardware reverse engineering Code review Penetration tests Our IoT CERT and its activites Equipment and appropriate skills for the IoT security specificities 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 4
Lack of authenticated signatures: possible alteration of software Top 5 IoT vulnerabilities Connected thermostat compromised by a ransomware 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 6
ZigbeeAlliance09 still often used Non-compliance with security best practices about key management (PKI) Bluetooth Smart PIN code easy to guess (0000, 1234, ...) ZigBee default key implemented on existing Lightify Osram lightbulbs 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 7 Top 5 IoT vulnerabilities
encryption by default Data size : 12 bytes maximum (AES not possible) LoRa No encryption by default (unlike LoRaWAN) 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 8 Top 5 IoT vulnerabilities
linked to a user Encryption or authentication keys 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 9 Top 5 IoT vulnerabilities
only protection Reuse of protected code... ... that accesses memory informations ! Content extraction with the microprocessor registry Extraction of secrets from RAM, of firmware from Flash 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 10 Top 5 IoT vulnerabilities
any RF communication Cheap devices (10€-400€) Open Source software, freely available P. 12 IoT devices vulnerabilities - aeronautics and aerospace security 28/09/2018
(1090 MHz) sent in clear (flight number, position, altitude, speed...) Same issues with cockpit conversations (120-130 MHz) and ACARS damage reporting protocol (131-137 MHz) 10€ device and typical range of 100 km! P. 14 IoT devices vulnerabilities - aeronautics and aerospace security 28/09/2018
vulnerabilities - aeronautics and aerospace security 28/09/2018 April 2016: French president and prime minister flights were easily trackable in realtime
- aeronautics and aerospace security 28/09/2018 ADS-B security from 1994 to 2014 "So you think you are safe", Eric Theunissen, Ministry of Defense - Netherlands, 2014
- aeronautics and aerospace security 28/09/2018 GPS security from 1994 to 2014 "So you think you are safe", Eric Theunissen, Ministry of Defense - Netherlands, 2014
IoT devices vulnerabilities - aeronautics and aerospace security 28/09/2018 September 2016: A Boeing 757 was hacked remotely in its runway using RF protocols
signalling protocol is plaintext, so it’s easy to map the base stations antennas and then geolocate a device.... P. 21 IoT devices vulnerabilities - aeronautics and aerospace security 28/09/2018
are accessible from the Internet due to a lack of security: sensitive areas are made more vulnerable P. 22 IoT devices vulnerabilities - aeronautics and aerospace security 28/09/2018
Security label for IoT solutions One protects your home, the other opens the door to intruders! 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 24
Sectorial guidance on IoT security by the ENISA U.S. Dept of Homeland Security Strategic Principles for securing IoT NIST Special Publication 800-160 Projet OWASP for the IoT NESCOR Standard UL 2900 Standard Security label for IoT solutions IoT security is on the way, but connected solutions are already largely widespread 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 25
enables future buyers, companies or individuals to identify the security level of a connected solution according to a reliable, neutral and independent indicator. 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 26
IoT devices vulnerabilities - aeronautics and aerospace security P. 27 A repository based on SSI standards (OWASP IoT, RGS), best practices and on our feedback on the safety assessment of more than 100 IoT solutions
sectors of the IoT Repository integrating requirements of security standards, IS best practices and feedback from Digital Security Two levels of labelling: ↪Standard ↪Advanced Independent labelling committee provides the label for 2 years Promotion of the label to companies and to the general public (2018) Security label for IoT solutions 28/09/2018 IoT devices vulnerabilities - aeronautics and aerospace security P. 29