Diversity, Safety and Security in Embedded Systems: Modelling Adversary Effort and Supply Chain Risks

Ilir Gashi, A. Povyakalo, L. Strigini
{"title":"Diversity, Safety and Security in Embedded Systems: Modelling Adversary Effort and Supply Chain Risks","authors":"Ilir Gashi, A. Povyakalo, L. Strigini","doi":"10.1109/EDCC.2016.27","DOIUrl":null,"url":null,"abstract":"We present quantitative considerations for the design of redundancy and diversity in embedded systems with security requirements. The potential for malicious activity against these systems have complicated requirements and design choices. New design trade-offs have arisen besides those already familiar in this area: for instance, adding redundancy may increase the attack surface of a system and thus increase overall risk. Our case study concerns protecting redundant communications between a control system and its controlled physical system. We study the effects of using: (i) different encryption keys on replicated channels, and (ii) diverse encryption schemes and implementations. We consider two attack scenarios, with adversaries having access to (i) ways of reducing the search space in attacks using random searches for keys; or (ii) hidden major flaws in some crypto algorithm or implementation. Trade-offs between the requirements of integrity and confidentiality are found, but not in all cases. Simple models give useful design insights. In this system, we find that key diversity improves integrity without impairing confidentiality - no trade-offs arise between the two - and it can substantially increase adversary effort, but it will not remedy substantial weaknesses of the crypto system. Implementation diversity does involve design trade-offs between integrity and confidentiality, which we analyse, but turns out to be generally desirable for highly critical applications of the control system considered.","PeriodicalId":166039,"journal":{"name":"2016 12th European Dependable Computing Conference (EDCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 12th European Dependable Computing Conference (EDCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDCC.2016.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

We present quantitative considerations for the design of redundancy and diversity in embedded systems with security requirements. The potential for malicious activity against these systems have complicated requirements and design choices. New design trade-offs have arisen besides those already familiar in this area: for instance, adding redundancy may increase the attack surface of a system and thus increase overall risk. Our case study concerns protecting redundant communications between a control system and its controlled physical system. We study the effects of using: (i) different encryption keys on replicated channels, and (ii) diverse encryption schemes and implementations. We consider two attack scenarios, with adversaries having access to (i) ways of reducing the search space in attacks using random searches for keys; or (ii) hidden major flaws in some crypto algorithm or implementation. Trade-offs between the requirements of integrity and confidentiality are found, but not in all cases. Simple models give useful design insights. In this system, we find that key diversity improves integrity without impairing confidentiality - no trade-offs arise between the two - and it can substantially increase adversary effort, but it will not remedy substantial weaknesses of the crypto system. Implementation diversity does involve design trade-offs between integrity and confidentiality, which we analyse, but turns out to be generally desirable for highly critical applications of the control system considered.
嵌入式系统的多样性,安全性和安全性:模拟对手的努力和供应链风险
我们提出了在具有安全要求的嵌入式系统中设计冗余和多样性的定量考虑。针对这些系统的潜在恶意活动具有复杂的需求和设计选择。新的设计权衡已经出现在这个领域中:例如,增加冗余可能会增加系统的攻击面,从而增加整体风险。我们的案例研究涉及保护控制系统与其受控物理系统之间的冗余通信。我们研究了使用:(i)在复制通道上使用不同的加密密钥,以及(ii)不同的加密方案和实现的影响。我们考虑两种攻击场景,攻击者可以访问(i)使用随机搜索密钥来减少攻击中的搜索空间的方法;或者(ii)某些加密算法或实现中隐藏的重大缺陷。在完整性和机密性需求之间找到了折衷,但并非在所有情况下都是如此。简单的模型提供有用的设计见解。在这个系统中,我们发现密钥多样性在不损害机密性的情况下提高了完整性——两者之间没有权衡——并且它可以大大增加对手的努力,但它不会弥补加密系统的实质性弱点。实现多样性确实涉及完整性和机密性之间的设计权衡,我们对此进行了分析,但事实证明,对于所考虑的控制系统的高度关键应用通常是理想的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信