The Industrial Challenges in Software Security and Protection

The Industrial Challenges in Software Security and Protection

The Industrial Challenges in Software Security and Protection Yuan Xiang Gu Co-Founder of Cloakware Senior Technology Advisor, Irdeto Guest Professor, Northwest University The 9th International Summer School on Information Security and Protection Canberra, Australia, July 9 - 13, 2018 1 © 2017 Irdeto. All Rights Reserved. © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Myself Briefing . 1975 -1988: Professor of Northwest University in China . 1988 -1990: Visiting professor of McGill University, Canada . 1990 -1997: Senior scientist and architect at Nortel . 1993: Effective Immune Software (EIS, early Cloakware idea) . 1997 - 2007: Co-founder and executive positions of Cloakware . 2007 - 2018.April: Chief Architect, Irdeto . leading security research and collaboration with universities worldwide . 2011 - present: Guest professor of Northwest University, China . 2018.May - present: Senior Technology Advisor, Irdeto 22 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com ISSISP History . The 1st ISSISP was held in Beijing, China, in 2009 . Jack Davidson, Christian Collberg, Roberto Giacobazzi, Yuan Gu, etc. Have been holding in following . 3 times in Asian (China, India) . 3 times in Europe (Belgium, Italy, France) . 1 time in North America (USA) . 1 time in South America (Brazil) . 1 time in Australia . ISSISP2019 is considering to hold in China to celebrate the 10th year of anniversary 33 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com SSPREW History . The 1st international workshop on Software Security and Protection (SSP) with IEEE ISI was held in Beijing, China, in 2010 . Christian Collberg, Jack Davidson, Roberto Giacobazzi, Yuan Gu, etc. Since 2016, SSP has merged with Program Protection and Reverse Engineering Workshop (PPREW) into SSPREW (Software Security, Protection and Reverse Engineering Workshop) co-located with ACSAC. SSPREW 2018 with ACSAC is to hold in to on Descemer 3–7, 2018, Puerto Rico, USA (CFP soon) 44 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com SECURING DIGITAL ASSETS FOR 21 YEARS +5 BILLION DEVICES & APPLICATIONS SECURED 50 MILLION TRANSACTIONS PROTECTED PER DAY OVER 70 SOFTWARE-BASED CLOAKED CA CUSTOMERS WORLDWIDE WITH OVER 25 MILLION DEPLOYED CLIENT DEVICES 70 MILLION PERSONALIZED SEMICONDUCTOR CHIPS PROVISIONED VIA IRDETO’S KEYS & CREDENTIALS SOLUTION MORE THAN 191 MILLION CRYPTOGRAPHIC KEYS GENERATED AND UNDER MANAGEMENT 5 Agenda . Part 1: Trends in Threats and Security Paint Points . Part 2: New Challenges and White-box Security . New Challenges to Information Security . White-Box Attacks in Real World . Software Security: More Than Vulnerability . Power of Software Protection . Software Security Immunity . Connected Application central based Security Model . AI and ML Security Problems . Software Security Lifecycle and Digital Asset Protection . New View of Information Security . Part 3: White-box Security Patterns . Introduction to WB Computing Security Patterns . Description in Details of Selected WB Security Pattern 66 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Part 1: Trends in Threats and Security Paint Points Days of hacking games and movies are over… ... Attacking busines is the new trend! 7 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com SW Protection Business Trends AI & ML SW Apps & IOT Devices Web Applications and Systems Applications Mobile Payments Connected & Intelligent & Autonomous Vehicles Games E-Commerce Digital Contents 2015 + (TV, Video, Music, Film) 2010 + 1995+ 88 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com 9 Connected World: While Smarting Everything, Can We Secure Everything? Smart Home Smart Smart Transportation Smart Health Environment Smart Office Smart Utilities Smart Business Smart Agriculture Smart Building Smart City Smart Education Smart Earth Any device or sensor with an IP address connected to a system network via Internet is an entry point for hackers and cybercriminals: Just like leaving your front door wide open for thieve 9 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Cybersecurity Attacks in Connected and Intelligent Vehicles 2015 2015 Dealer malware Key fob 2010 propagation replicator 2016 2017 OnStar remote 2010 control Nissan Leaf Tesla hacked mobile app by Keen Wifi laptop 2015 again remote control Jeep hack Automotive Cybersecurity History OnStar 2014 unlock / start 2015 2016 Remote control through Zubie dongle takeover Tesla WebKit hack Tesla Wifi and Android App 2015 2015 BMW unlock 2015 Corvette insurance dongle 10 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com 2018 Cybersecurity Attacks in Connected and Intelligent Vehicles ▪ January ▪ Rare Malware Targeting Uber’s Android App Uncovered. ▪ Canadian Train Company Targeted by North Korean Cyberattack. ▪ Australian Car-Sharing Company in Identity Theft Hack. ▪ Charging Electric Cars: A Free Ride for Hackers. ▪ February ▪ Thieves Hack Into Keyless Entry Fob and Steal Cars in UK. ▪ Tesla Hackers Hijacked Amazon Cloud Account to Mine Cryptocurrency. ▪ For Cadillac, CAN Bus data exposed by On-Board Diagnostics-sniffing. ▪ March (bad month for self-driving vehicles) ▪ Failed Tesla Autopilot system caused a killing of a woman ▪ Uber’s Volvo SUV killed a pedestrian woman. ▪ May ▪ The team from Tencent’s Keen Security Lab discovered 14 vulnerabilities in over tens of millions of BMW connected vehicles. 11 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Hackers Everywhere and Hacking is Big Business • For Fun • Unsophisticated Attackers • For Profit • Cheaters • Black Business • Organized Crime • Terrorist Organizations Hacktivists • For Special Interests • Competitors • Nation States • Terrorist Organizations • For Challenge • Sophisticated Researchers 12 ©2017 Irdeto, All Rights Reserved. – www.irdeto.com 12 Cybercrime has evolved from single hackers into resilient highly skilled organizations performing global cyber attacks Presenter Name • Cyber breaches recorded by businesses have almost doubled in five years, from 68 per business in 2012 to 130 per business in 2017. Presenter Title • A 2017 study of 254 companies across seven countries put the annual cost of responding to cyberattacks at £11.7 million per company, a year-on-year increase of 27.4%. Location • The financial impact of cybersecurity breaches is rising, and some of the largest costs in 2017 related to ransomware attacks. The cost of cybercrime to businesses over the next five years is expected to be US$8 trillion. Date • Another growing trend is the use of cyberattacks to target critical infrastructure and strategic industrial sectors, raising fears that,Classification in a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning. (Source: Marsh Global Risks Report 2018) 13 16 ©©2016 2017 Irdeto,Irdeto. All RightsRights Reserved.Reserved. –– www.irdeto.com Growing Impact Scope of Security Threats • Kill and hurt people’s life • Disorder societies • Destroy and hurt businesses • Damage nations and the • Financial lost world • Business lost • Reduce Productivities • Multiple nations • Inconvenience • Cross continents • Millions of persons • Any connected environments • Billions of devices • Any connected devices • Millions of networks • Anyone & Any where & Any time • Individual persons • Millions of companies • Individual devices • Millions of organizations • Individual companies • Individual networks • Individual organizations 1414 ©2017 Irdeto, All Rights Reserved. – www.irdeto.com Mirai – Botnet on Steroids (DDoS) KrebsOnSecurity.com was knocked offline by 620Gbps DDoS. One of the biggest ever recorded. This was followed by a 1Tbps attack against French web host OVH Indications are that an estimated 500k+ IoT devices such as security cameras and DVRs were used as a botnet for the attack. Botnet of refrigerators? Cars? Traffic Lights? Medical Devices? Would we even know it was happening? 15 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Ransomware – Willingness To Harm Mobile ransomware quadrupled in 2015 Fast becoming a mature, million dollar business for organized crime 35 known ransomware “products” in operation in 2015 Targeting corporations and public entities such as municipal gov’ts and hospitals 16 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com RansomwareRansomware in Healthcare Healthcare 2016 2016 2016 Healthcare providers Hollywood Klinikum Arnsberg Methodist Hospital pay USD $6B annually Presbyterian Germany USA to ransomware USA USA top target for TeslaCrypt | 777 ransomware with 2016 2016 Xorist | Cerber 320,000+ infected Lukas Hospital Chino Valley Medical GhostCrypt | SamSam systems Germany USA CryptoLocker MSIL/Samas | Locky Cerber “ransomware- 2016 as-a-service” takes 2016 2016 Kansas Heart Hospital 40% of extorted DeKalb Health Ottawa Hospital USA profits; run by Russian USA Canada crime ring 17 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Global Ransomware – WannaCry & Petya ▪ On May 12, 2017: WannaCry attacks to 300,000 machines in 150 countries worldwide ▪ On June 27, 2017: Petya attacks in Europe, the Middle East and the US 18 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Software Makes Digital World Real & Live Software makes data, functionalities, properties, assets … Software makes networks, connections, and communications … Software makes applications, systems, devices, servers … Software plays music, videos, games … Software drives satellites, planes and connected vehicles … Software is doing everything in digital … 19 © 2017 Irdeto. All Rights Reserved. – www.irdeto.com Problem:

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    138 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us