Wh What t abou
- ut
t th the e sof
- ftw
Wh What t abou out t th the e sof oftw twar are? e? How - - PowerPoint PPT Presentation
Wh What t abou out t th the e sof oftw twar are? e? How many security vulnerabilities are there in the software implementing all this smart grid functionality and the underlying protocols? Erik Poll Radboud University Nijmegen Moti
2 Erik Poll Radboud University Nijmegen
3 Erik Poll Radboud University Nijmegen
Erik Poll Radboud University Nijmegen 4
command injection, path traversal attacks, SQL injection, HTML injection, XSS, CSRF, database command injection, database function injection, PHP file name injection, LDAP injection, ShellShock, HeartBleed, FREAK, ...
Like social engineering or hypnosis as attack vector on humans?
Erik Poll Radboud University Nijmegen 5
Eg interpreting a string as filename, URL, or email address
6 Erik Poll Radboud University Nijmegen
7 Erik Poll Radboud University Nijmegen
8 Erik Poll Radboud University Nijmegen
9 Erik Poll Radboud University Nijmegen
10 Erik Poll Radboud University Nijmegen
11 Erik Poll Radboud University Nijmegen
12 Erik Poll Radboud University Nijmegen
[MSc thesis Jordi van Breekel, 2014]
14
GSM is a extremely rich & complicated protocol
15
Field size Message Type Indicator 2 bit Reject Duplicates 1 bit Validity Period Format 2 bit User Data Header Indicator 1 bit Reply Path 1 bit Message Reference integer Destination Address 2-12 byte Protocol Identifier 1 byte Data Coding Scheme (CDS) 1 byte Validity Period 1 byte/7 bytes User Data Length (UDL) integer User Data depends on CDS and UDL
16
[Mulliner et al, SMS of Death] [Fabian van den Broek, Brinio Hond, Arturo Cedillo Torres, Security Testing of GSM Implementations, Essos 2014]
17
weird traffic
18
19
you have a fax!
20
name of Mobile Soccer game shows up inside text message
again, or to remove weird icons
acknowledgement was sent before crashing, re-crashing phone But: not all our SMS messages could be sent over real network
21
22
23
24
25
26
27
28
29
30
A case study of DNP3 Adam Crain and Sergey Bratus, Security & Privacy, IEEE, 2015 Also http://langsec.org/dnp3
Fabian van den Broek, Brinio Hond, Arturo C. Torres, ESSOS 2014
Joeri de Ruiter and Erik Poll, Usenix Security 2015
Erik Poll, Joeri de Ruiter, and Aleksy Schubert, Security and Privacy Workshops (SPW), IEEE, 2015
31
32
33
complete state machine of USB-connected e.dentifier