SlideShare ist ein Scribd-Unternehmen logo
1 von 66
Downloaden Sie, um offline zu lesen
Low-end	IoT Devices Security	
with Open	Source	and	RIOT
Emmanuel	Baccelli
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Context
§ World	War III	is upon us	(online)
§ geopolitically-driven (state-driven)
§ profit-driven (pirates,	zero-day attacks)
§ Personal data-hungry Behemoths are	upon us
§ captive	users,	walled gardens,	not	necessarily secure
§ EU	fightback:	General	Data	Protection	Regulation(GDPR)
reality.ai
Anonymous
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Context
§ Extreme computing power	becomes average
§ Now:	pooledpower,	from NSA to	botnets &	everything
in	between (e.g.	Coinhivecovert mining ads)	
§ Later:	quantum	computing?
§ Ubiquitous computing &	connectivity is upon us
§ Giant	cyberphysical robot
§ High-end	IoT vs	Low-end	IoT
Microsoft
BiffTenon
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Hardware
Low-end	IoT devices
- 1000x	less energy than
RaspberryPi
- kBytes instead of	GBytes
of	memory
Internet
Microcontrollers e.g.
AVR	(8-bit)
MSP430	(16-bit)
Cortex	M	(32-bit)
MIPS
…
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Low-end	IoT Devices :	Polymorphism
§ Various vendors
§ Various architectures	(8-bit,	16-bit,	32-bit)
§ Various low-power	communication	technologies	(BLE,	802.15.4,	DECT…)
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
You	don’t control	what you can’t program	
• Software	platform on	usual machines:	Linux	
ü provides programmability &	full	control	for	developers &	users
• On	low-end	IoT devices?	
Old			:		Closed-source,	vendor-locked software
Next :		RIOT &	new	open-source	IoT operating	systems
O.	Hahm et	al.	"Operating	Systems for	Low-End	
Devices in	the	Internet	of	Things:	a	Survey,"	
IEEE	Internet	of	Things Journal,	2016.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
RIOT	Principles
9
Architecture	– minimal,	real-time	kernel +	various modules
1kB	RAM	and	2kB	Flash	on	16-bit	(slightly	more	on	32-bit,	less	on	8-bit)
ü Multi-threading,	thread	synch.	with	mutexes,	semaphores	and	IPC
ü Separate thread	context &	memory	stack (but	single	memory	space)
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
RIOT	Principles
ü Unified	APIs	– across	all	hardware	(8- 16- 32-bit),	even	for	hardware-accessing	APIs;	
Brings	code	portability	and	minimizes	code	duplication;
ü Vendor	&	Technology	Independence	– Vendor	libraries	are	avoided;												
Design	decisions	don’t	tie	RIOT	to	a	particular	technology;
ü Modularity – building	blocks,	to	be	combined	in	all	thinkable	ways;		
Caters	for	versatile	use	cases	&	memory	constraints;	
ü Static	Memory	– extensive	use	of	pre-allocated	structs;	
Caters	for	reliability,	simplified	verification,	and	real-time	requirements;
10
Architecture	– minimal,	real-time	kernel +	various modules
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
RIOT:	Large	Open-Source	Community
§ 2013:	started as	French-German research project
§ 2018:	more	than 180	contributors worldwide
§ 17,000	commits and	7,200	Pull	Requests
§ Support	for	100+	types	of	hardware	platforms
§ First	productsshipping	RIOT	last	year
§ Hundredsof	related scientific publications
§ Yearly RIOT	Summit conference
next in	Amsterdam,	Sept.	13-14,	see http://summit.riot-os.org
Source:www.openhub.net/p/RIOT-OS
Monthly contributors
Lines of code
github.com/RIOT-OS/RIOT
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Some Deployments &	Products
Using RIOT
§ Telefonica (Chile):	deployment in	a	copper mine
§ Cisco	(USA)	and	Huawei (USA):	test	deploymentsof	ICN-IoT
§ Algramo (Chile):	deployment in	fleet of	cereal vendingmachines
§ Hamilton	IoT (USA)	:	environment sensinghardware	+	cloud	services
§ Unwired devices (Russia):	LoRa communication	module
§ Eisox (France):	smart	heating
§ Upcomingproducts
§ Continental	/	OTAkeys (Belgium):	On-Board diagnostics	for	connected cars
§ Sleeping	Beauty	(Germany):	GPS	tracking device with an	integrated GSM	modem
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
RIOT	Overview
§ Kernel Characteristics
§ System-level Interoperability
§ Network-level Interoperability
§ Open-source	Community Aspects
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	Kernel Overview
Modular architecture	based on	a	minimal,	real-time	kernel
§ Multi-threading,	thread	synch.	with	mutexes,	semaphores	and	IPC
§ Separate thread	context &	memory	stack (but	single	memory	space)
E.	Baccelli et	al.	"RIOT:	an	Open	Source	Operating	
System	for	Low-end	Embedded	Devices in	the	IoT,"	
IEEE	Internet	of	Things Journal,	2018.
How?
üSmall	Thread	Control	Block	(TCB)
üMinimized	Stack	Usage
üSmall	&	fast	Inter-Process	Communication	(IPC)
üTickless,	O(1)	scheduler	w.	priorities	&	preemption
(Note:	Multi-threading	 is	optional)
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	Kernel Overview
Default	configuration,	2	threads:
§ main thread	running	the	main	function
§ idle thread:	lowest priority
üfallback when other threads	are	blocked/done
üthe	idle thread	automatically switches	to	the	lowest possible	power	mode
§ (ISR	context handles external events and	notifies	threads	using IPC)
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	Kernel Overview
Some	numbers…
On	a	low-end	IoT device	(16-bit,	8	MHz):
ü Min.	TCB:	8	bytes;	 Min.	Stack	Size:	96	bytes
ü IPC:	up	to	16,000	Messages/s	(~	10k	Packets/s	for	802.15.4)
ü Kernel:	requires	only	1kB	RAM	and	2kB	Flash
More	numbers…
ü On	Cortex-M	(32-bit):	Kernel	is	2,8kB	RAM	and	3.2kB	Flash
ü On	AVR	(8-bit):	Kernel is 800B	RAM	and	4.2kB	Flash
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT	Overview
§ Kernel Characteristics
§ System-level Interoperability
§ Network-level Interoperability
§ Open-source	Community Aspects
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	System-level Interoperability
§ Core of	RIOT	in	(ANSI)	C
§ No	macro	‘magic’	
§ Board/cpu/drivers	abstraction	layer
§ Well defined APIs,	consistent	across
all	supported hardware
§ Cherry-picking	POSIX
Applications
Libraries
xtimer, . . .
Network stacks
Core
Network
Device Drivers
Sensor/Actuator
Drivers
Hardware
sock
SAUL
netdevCore APIs
CPU abstraction Periph APIs
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	System-level Interoperability
§ Drawbacks:	
§ some memory	overhead,	but	still fits
low-end	IoT devices memory	budget
§ some more	work because re-implement
from scratch	(behind vendor header	files)
§ Advantages:
§ Efficient	&	highly reusable code	across
all	supported hardware
§ Emulation of	RIOT	as	a	Linux	process
§ Reusabilityof	well-known3rd-party	tools
such as	gdb,	valgrind,	gprof…
Applications
Libraries
xtimer, . . .
Network stacks
Core
Network
Device Drivers
Sensor/Actuator
Drivers
Hardware
sock
SAUL
netdevCore APIs
CPU abstraction Periph APIs
C,	C++	(JavaScript,	Rust)
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	System-level Interoperability
§ Packages:	bundling3rd-party	libraries
§ Integrated	on-the-flyat	build–time
§ Easyto	add:	just requires 2	Makefiles
§ Patches	(if	needed)	are	typically minimal
Applications
Libraries
xtimer, . . .
Network stacks
Core
Network
Device Drivers
Sensor/Actuator
Drivers
Hardware
sock
SAUL
netdevCore APIs
CPU abstraction Periph APIs
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	Network-level Interoperability
Wired &	Bus
§ CAN
§ Ethernet
Low-power	wireless LAN	&	WAN
§ IEEE	802.15.4
§ LoRa package
§ BLE	(work-in-progress)
IP	Protocols Stacks
§ Default	stack (GNRC)
§ Thread	(package)
§ lwIP (package)
§ OpenWSN (in	progress)
Experimental stacks
§ CCN-lite	(package)
§ NDN-RIOT	(package)
Applications
Libraries
xtimer, . . .
Network stacks
Core
Network
Device Drivers
Sensor/Actuator
Drivers
Hardware
sock
SAUL
netdevCore APIs
CPU abstraction Periph APIs
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT	Overview
§ Kernel Characteristics
§ System-level Interoperability
§ Network-level Interoperability
§ Open-source	Community Aspects
Emmanuel	Baccelli,	Inria — SILECS	workshop,	04.04.2018
RIOT:	Large	Open-Source	Community
Grassroots governance by	two bodies
§ see https://github.com/RIOT-OS/RIOT/wiki/RIOT-Community-Processes
Maintainers
§ Status acquired via	meritocracy on	Github
§ Duties:	review incomingcode	contributions
§ Rights:	can merge in	the	master	branch
Coordinators
§ Status granted by	co-founders
§ Duties:	strategy steering
§ Rights:	some praise ;)
RIOT e.V.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Surface
§ Inherent Tradeoffs
§ IoT Security	Trends
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Traditional IT	Attack	Surface
§ Human vector
§ Misconfiguration,	phishing,	social	engineering
§ 95%	security incidents	involvehuman error*
§ Hardware	vector
§ e.g.	Spectre	&	Meltdownvulnerabilities on	
recent processors:	leaks breaking isolation
§ … and	backdoors from NSA	&	co ?
*	Cybersecurity Intelligence	Index,	IBM,	2014.
xkcd.com No	1938
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Traditional IT	Attack	Surface
§ Low-level software	vector
§ e.g.	EternalBlue vunerabilityon	Windows	<10	
(NSA	exploit	turned bad,	used in	WannaCry)	
§ e.g.	HeartBleed OpenSSL (also on	Linux!)
§ Fatal	combination:	exploit	OS	&	network	stack
vulnerabilitiesto	inject malicious code
§ High-level software	vector
§ e.g.	malicious PDF	exploitingAdobe	Reader	
vulnerabilities
itsecurityguru.org
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Traditional IT	Attack	Surface
§ Software	supply-chain vector
§ e.g.	backdoor hacked into software	updates		
of	Ccleaner application*
§ attack laced legitimate software	with malware	
(distributedby	a	security company!!!)
*	www.wired.com/story/ccleaner-malware-supply-chain-software-security
xda-developers.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT vs Traditional IT	Attack	Surface
§ IoT~Machine-to-Machine:	the	human factor	is less important
§ Single	binary systems (so far)
§ no	high-level software
§ Low-end	memory,	CPU	capacities
§ kBytes of	memory	instead of	Gbytes or	more
§ MHz	instead of	GHz
§ mW	or	less,	instead of	W	or	more
iotworm.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT vs Traditional IT	Attack	Surface
§ IoT~giant cyberphysical robot:	hacked
system	can cause	direct	physical harm
⇒ acceptable	risks are	changed
§ Sensors everywhere,	all	the	time
⇒ scope	of	privacy breaches are	changed
§ Industrial IoT applications*
⇒ required level of	system	availabilityis higher
*	AR	Sadeghi et	al.	"Security	and	Privacy Challenges	in	Industrial Internet	of	Things,"	in	ACM	DAC,	2015.
nbcnews.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
In	a	nutshell
§ Humans
§ Hardware
§ Low-level software
§ High-level software
§ Software	supply-chain
§ Good	news:	
§ attack surface	is probably smaller than usual
§ Bad	news:	
§ harsher contraints	&	potentiallymore	impactful attacks
§ no	human in	the	loop means its harder	for	some aspects	(bootstrap…)
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Data	Economy vs Privacy
The	utility/privacy trade-off
§ Companies:
§ Some do	not	care	about	privacy,	
§ Others need data	to	provideservices
§ End-users:	
§ want services,	
§ but	want control	of	their privacy
§ How	to	go	from here (massive	data	raiding)	
to	there (user-tunable signal)?	
Techcrunch.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
(National)	Security	vs Privacy
§ From individual surveillance	to	mass surveillance	
(and	back	again?)	
§ Crippling crypto	to	let	NSA	through will also let	
(DIY)	pirates	through
§ Unsolvable problem?
Vuze.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Performance	vs Security
30s	to	verify a	digital	signature?
§ Exacerbatedon	(future	legacy)	low-end	IoT hardware
§ Bottomline:	cat	&	mouse	play to	remain just above risk threshold
§ Necessary complement:	IoT software	updates
Steve	Hauptmanblog
Perf.
Sec.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Bottomline:	Functionality vs Risk
§ Today's IoT:	not	an	acceptable	tradeoff w.r.t.	functionalities vs risks
§ B.	Schneier:	Internet	of	(Unsecure)	Things*
§ Dimensions	of	the	work needed to	change	that?
§ Improvingfunctionality
§ Better IoT hardware
§ Richer	IoT software	
§ Mitigating risks
§ More	IoT security
*	https://www.rsaconference.com/blogs/bruce-schneier-talks-about-securing-the-world-sized-web-at-rsac-apj-2016
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
§ Trusted IoT Hardware
§ IoT Cryptography Primitives
§ IoT System	Software
§ IoT Network
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT:	The	Hardware	Vector
§ Various categories of	attacks
§ invasive	hardware	attacks
§ reverse	engineering	attacks
§ side-channel attacks
§ Information	gained with timing	information,	power	consumption,	
electromagneticleaks,	speculative execution,	caching…
⇒ But	not	the	focus	in	this talk
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Trusted Execution on	IoT Hardware
§ Principle:	secure area	of	a	processor	for	isolated execution,	integrity of	
trusted applications	&	confidentiality of	their assets
§ Sancus*	on	MSP430	16-bit	microcontrollers(OpenMSP430)
§ Prototype	isolating software	components	via	memory	curtaining
§ Added MMU	and	crypto	HW	unit	on	openMSP430	(open	source!)
§ Text/Data/ProgramCounter states	monitoring/matching,	per	software	component
§ Remote attestation	&	authenticates communication	with software	component
§ HW	crypto	enables key	derivation per	software	component
§ Sancus2.0	tested in	automotivecontext.	Claims	only 6%	energy overhead
§ Similar:	TrustZone for	popular ARM	Cortex-M	32-bit	microcontrollers
§ Upcoming Cortex-M33	and	Cortex-M23	micro-controllers
*	J.	Noormans et	al.	'Sancus 2.0:	A	Low-Cost	Security	Architecture	for	IoT Devices',	ACM	Transactions	on	Privacy and	Security,	2017
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Trusted Execution on	IoT Hardware
§ TEEP working group	at	IETF	*
§ Context:	delete,	update	applications	running	in	the	TEE
§ Goal:	communicationbetween the	TEE,	a	relay outside TEE	&	a	remote server
⇒ Trusted execution environment protocol (TEEP)
Side note:	installingnew	software	in	the	TEE	increases attack surface…
*	https://datatracker.ietf.org/wg/teep/documents/Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
§ Trusted IoT Hardware
§ IoT Cryptography Primitives
§ IoT System	Software
§ IoT Network
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Crypto	Primitives
§ Devices deployed now will last	for	years
§ Maybe decades!	
§ MSP430	runs 12	years on	an	AA	battery.
§ Energy harvesting
§ Future-proof	crypto	is thus crucial.	Quantum	resistance?
§ Trade-off:	key	&	signature	size	vs speed	*
§ ex.	ECC	256b	key	vs McEliece 500kB	key
§ ex.	ECC	80B	signature	vs MQDSS	40kB	signature	
*			S.	Samardjiska 'Post	Quantum	Cryptography for	the	IoT,'	RIOT	Summit,	2017Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Crypto	Primitives
It	is neverthelesspossible	to	prepare IoT crypto	for	post-quantum	now
§ symmetric crypto	needs upgrade	but	same security =~ double	key	size
§ asymmetric crypto	
§ some techniques	would break	entirely (e.g.	RSA?)
§ some techniques	are	quantum-resistant(hash-basedsignatures…)
§ NIST lightweight crypto	effort	recently launched *
§ Upcoming:	profiles	based on	communityresponses to	reports/questions
§ (Conspiracytheory:	baked-in	backdoors ?)
*	K.A.	McKay	'Report	on	Lightweight Cryptography,'	 NIST	Report	NISTIR	8114,	2017Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Crypto	Primitives
§ IoT Symmetric Crypto
§ IoT Asymmetric Crypto
§ Operations	over	Encrypted IoT Data
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Symmetric Crypto
§ Symmetric =	same key	everywhere.
More	flexible	primitives:
SHA-3’s	sponge construction*	for	hashing
§ Easyto	(re)configure	securitylevel
§ Just	vary capacity c
§ Shared code	to	providevarious functions
§ Pseudo-random number generator
§ Message	authentication code	(MAC)
§ Stream	encryption
§ (more	with the	duplex	construction)
§ On-going workexperimentalworkto	evaluate
this prospect	on	top	of	RIOT
G.	Van	Assche 'Permutation-based cryptography
for	the	IoT,'	RIOT	Summit,	2017.	
*	G.	Bertoni et	al.	'Cryptographic sponge functions’,	 2011.Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Asymmetric Crypto
§ Symmetric crypto:	
§ communicating entities need a	shared secret	(the	key)
⇒ key	distribution	problem,	Pre-Shared Key	(PSK)	is norm on	IoT
§ Asymmetric crypto	with public/private keys:	
§ Public	Key	Infrascruture (PKI)	solves key	distribution	
§ Public	key	allows digital	signatures
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Asymmetric Crypto
Smaller &	faster crypto
§ more	efficient	implementation
§ tweetnacl (Bernstein	et	al.):	Source	funnily fits in	100	tweets,	
using curve25519
§ more	efficient	algorithms
§ uKummer *:	Smarter use	of	algebraic geometry
§ software-onlyhyperellipticcryptographyon	constrained platforms
§ demonstratedon	AVR	8-bit	and	ARM	Cortex-M	32-bit
§ up	to	70%	faster &	80	%	smaller compared to	using curve25519
§ qDSA **:	even smaller stack &	code	size	
*			J.	Renes et	al.	‘μKummer:	Efficient	hyperelliptic signatures	and	key	exchange	on	microcontrollers’,	 CHES,	2016.
**	J.	Renes,	B.	Smith	‘qDSA:	Small	and	Secure	Digital	Signatures	with Curve-based Diffie–Hellman Key	Pairs’,	ASIACRYPT	2017.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Asymmetric Crypto
Humans (even if	very skilled)	make buggy	code	
§ Formally verified crypto	code
§ HACL*	library:	written in	F*	programming language,	
§ F*	code	formally verified (memory	safety,	mitigations	against timing	
side-channels,	and	functional correctness)
§ F*	code	then compiledto	readable C	code
§ Elements of	HACL*	already in	Firefox	(Quantum,	latest verion)
§ Elements of	HACL*	currently integrated into RIOT
*	JK	Zinzindohoué et	al.	‘HACL*:	A	verified modern	cryptographic library,’	ACM	CCS,	2017Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Operations	over	Encrypted IoT Data
The	cloud,	or	the	server	hosting IoT database may not	be trusted
⇒ Nevertheless it may be required to	(batch)	process IoT data
§ Use	of	partially homomorphic crypto	
§ Talos	and	Pilatus prototype	platforms *
§ Allows some operations (range,	sum)	over	encrypted data
§ Using Elliptic-CurveElGamal crypto-system	(instead of	Paillier)
§ Encryption by	low-end	IoT devices themselves (demonstrated on	Cortex-M3)
*	H.	Shafagh et	al.	'Secure	Sharing	of	Partially Homomorphic Encrypted IoT Data,'	ACM	SenSys,	2017
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Operations	over	Encrypted IoT Data
§ Body	of	work on	differentialprivacy in	the	field of	smart	metering *
§ Followedseminal work from Dwork in	2006
§ Principle:	add (some)	noise	to	IoT data	points	
§ Differential guarantee =	analysts draws same conclusions	about	an	individual
whether the	individualincludeshimself in	the	dataset or	not
§ Still able	to	extract coarse signal	from aggregate data	(e.g.	mean,	average…)
§ No	privacy violation	in	practice	
*	V.	Rastogi et	al.	‘Differentially Private Aggregation of	Distributed Time-Series with Transformation	and	Encryption’,	ACM	SIGMOD	2011.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ IROT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
§ Trusted IoT Hardware
§ IoT Cryptography Primitives
§ IoT System	Software
§ IoT Network
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT System	Software
*	O.	Hahm et	al.	"Operating	Systems for	Low-End	Devices in	the	Internet	of	Things:	A	survey,"	IEEE	Internet	of	Things Journal,	2016.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Trusting IoT Software	(a	priori)
Providing guarantees on	software	components	of	IoT operating	systems?
§ Tock OS	*	isolates software	faults &	manages	dynamic memory	for	applications
§ use	of	memory	protection	unit	(MPU)	of	Cortex-M4	and	of	Rust	programming language
§ Rust	enables memory-safety &	type-safety while providingperformance	close	to	C
§ MPU	enables isolation	of	processes from the	kernel and	from each other
§ Proven C	code	generated from F*	
§ Potential use	to	provide RIOT	components	other than the	HACL	crypto	library?
*	A.	Levy	et	al.	'Multiprogramming a	64	kB Computer	Safely and	Efficiently,'	 ACM	SOSP,	2017.Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
A	posteriori:	IoT Software	Updates
Internet/cloud
Border	router:
Connects	device	
to	the	Internet
IoT device:
Developer:
Update	Server:
Builds, signs	&
uploads updates
stores	updates
&	serves	them	
to	IoT devices
Downloads,	verifies
and	boots updates
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Full	IoT Software	Updates:	Firmware Updates
You	thought you were tight w.r.t.	memory?	
Memory	must	be further split	:
§ Bootloader
§ (e.g.	minimalistic config	or	RIOT)
§ Several OS	Images
§ Typically need >2	for	roll-back
§ Metadata
§ IETF	working group	SUIT	working on	standardizing metadata for	
IoT firmware *
OS	Image	2
OS	Image	1
Bootloader
Metadata
Metadata
*	https://datatracker.ietf.org/group/suit/documents/Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Partial	IoT Software	Updates
Various approaches:
§ differential updates	of	arbitraryparts	of	the	binary
⇒ Efficient	but	risky
§ modular program	&	dynamic binary module	loading
⇒ More	robust but	more	complex
§ use	interpreted languages (instead of	compiled)
⇒ Elegant but	interpreter overhead
Runtime .js container	demonstrated to	work on	Cortex-M	
based low-end	IoT devices with RIOT	*
⇒ explore	sandboxing properties of	this contruct?
OS	Image
*	E.	Baccelli et	al.	"Scripting	Over-The-Air:	Towards Containers	on	Low-end	Devices in	the	Internet	of	Things,"	IEEE	PerCom,	2018.
Efficiency of	firmware updates?
⇒ try partial	software	update
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Trusting IoT Software	Supply
Need to	verify legitimacy of	software	updates!
§ SUIT	working group	at	IETF:	metadata format	+	signatures	etc.	for	IoT firmware
§ https://datatracker.ietf.org/group/suit/documents/
§ CHAINIAC	*	decentralized frameworkto	verify software	update	legitimacy
§ source	code	&	binaries with reproduciblebuilds
§ collective	signing &	blockchain-like decentralizedconsensus	on	release	history
Side note:	enforcing legitimacy can turn bad -- beware of	TreacherousComputing
(R.	Stallman)	
*	K.	Nikitin et	al.	‘CHAINIAC:	Proactive	Software-Update	Transparency via	Collectively
Signed Skipchains and	Verified Builds,’	USENIX	Security	Symposium,	2017.
xda-developers.com
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
AGENDA
§ Context
§ RIOT
§ IoT Attack	Vectors
§ Inherent Tradeoffs
§ IoT Security	Trends
§ Trusted IoT Hardware
§ IoT Cryptography Primitives
§ IoT System	Software
§ IoT Network
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Communication	Protocol	Stack
Often wireless,	seldom wired
IEEE	802.15.4	
IPv6
RPL
BLE
UDP
CoAP LWM2MContent	Aware
Medium	Access
Transport
Routing
Network
Physical
…
LoRa …
6LoWPAN
ProtocolsLayers
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Communication	Protocol	Stack
§ Types	of	Attacks:	(D)DoS,	man-in-the-middle	attacks…
⇒Need for	Authentication,	Authorization,	Integrity,	
Confidentiality,	Bootstrapping
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Communication	Protocol	Stack
Content	Aware
Medium	Access
Transport
Routing
Network
Physical
SECURITY
DTLS	(over	UDP)	for	confidentiality,	 integrity,	
authenticity with public/private keys
OSCORE	end-to-end	encryption,	integrity,	&	
replay protection	for	CoAP (header/payload)
(IPsec,	routing protocol security…)
Link-layer	security sublayer for	authentication,	
confidentiality,	with symmetric keys
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Network	Protocol	Security
§ IoT link-layer	security:	filter legit packets early on
§ TypicallyAES,	128	bit,	in	hardware
⇒ HW	acceleration helps mitigate DoS attacks
(low-end	CPU,	easily overwhelmed)
§ Routing security:	avoiding sinkholes
§ e.g.	TRAIL	routing topologyauthenticationfor	RPL*
*	H.	Perrey et	al.	‘TRAIL:	Topology authentication in	RPL’,	arXiv,	2013Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Network	Protocols
§ Channel	security:	end-to-end	confidentiality,	integrity,	authenticity
§ From DTLS 1.2	to	1.3
§ New	handshake:	shorter message	exchange
§ Removed weak/old crypto
§ https://tools.ietf.org/html/draft-ietf-tls-dtls13
§ Object	security:	end-to-end	security beyond TLS	
§ OSCORE in-layer	security for	CoAP over	foo
§ CoAP and	HTTP	proxies require (D)TLS	to	be terminatedat	the	proxy…
§ https://tools.ietf.org/html/draft-ietf-core-object-security-08	
§ Information-centricvs	machine-centricnetwork	architecture
§ Novel paradigm Information-centric networking	(ICN)	yields natural object security
§ Recent work on	named-data	networking	(NDN)	applied to	IoT
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
IoT Network	Protocols
§ Scalable &	secure IoT device on-boarding
§ IoT device bootstrap with zero user	interaction,	for	hundreds of	devices ?
§ Studies on	pairing based on	(matching)	ambient	data	*
*	M.	Miettinen et	al.	'Context-based zero-interaction	pairing and	key	evolution for	advanced personal devices,'	ACM	CCS,	2014.
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
In	a	nutshell…
§ IoT security has	numerous aspects
§ Hardware
§ Algorithmic primitives
§ Software	(incl.	supply-chain)
§ Network
§ RIOT
§ Enables end-to-end	open	source
§ Aims to	bundle	bleeding-edge security
§ Provides a	solid base	for	future-proof	IoT
Emmanuel	Baccelli,	Inria — FU	Berlin,	18.04.2018
Thanks!

Weitere ähnliche Inhalte

Was ist angesagt?

How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Big Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesBig Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesMediaTek Labs
 
Embedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildEmbedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildLearn and Build
 
Bitidentify Security Technology
Bitidentify Security TechnologyBitidentify Security Technology
Bitidentify Security TechnologyKlaus Drosch
 
Internet of Things (IoT) Intro
Internet of Things (IoT) IntroInternet of Things (IoT) Intro
Internet of Things (IoT) IntroAnna Gerber
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT WSO2
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocolsClint Smith
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOTTechsparks
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overviewClint Smith
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Building Blocks for IoT Devices
Building Blocks for IoT DevicesBuilding Blocks for IoT Devices
Building Blocks for IoT DevicesAnil Gorthy
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureChiyang Lin
 
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalSoldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalJohn Soldatos
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain IoT Project
 

Was ist angesagt? (20)

How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Big Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesBig Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challenges
 
IOT
IOTIOT
IOT
 
Embedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildEmbedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and Build
 
Bitidentify Security Technology
Bitidentify Security TechnologyBitidentify Security Technology
Bitidentify Security Technology
 
Internet of Things (IoT) Intro
Internet of Things (IoT) IntroInternet of Things (IoT) Intro
Internet of Things (IoT) Intro
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
IoT4Devs (1)
IoT4Devs (1)IoT4Devs (1)
IoT4Devs (1)
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Building Blocks for IoT Devices
Building Blocks for IoT DevicesBuilding Blocks for IoT Devices
Building Blocks for IoT Devices
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architecture
 
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalSoldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overview
 

Ähnlich wie OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot

RIOT: towards open source, secure DevOps on microcontroller-based IoT
RIOT: towards open source, secure DevOps on microcontroller-based IoTRIOT: towards open source, secure DevOps on microcontroller-based IoT
RIOT: towards open source, secure DevOps on microcontroller-based IoTAlexandre Abadie
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...Paris Open Source Summit
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsQian JIN
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).BHAVIN GOSWAMI
 
Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Saurav Chaudhary
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?Mirco Vanini
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatinabati
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMSegment Security Services s.r.o.
 
The fight for surviving in the IoT world
The fight for surviving in the IoT worldThe fight for surviving in the IoT world
The fight for surviving in the IoT worldRadu Vunvulea
 
The fight for surviving in the IoT world - Radu Vunvulea
The fight for surviving in the IoT world - Radu VunvuleaThe fight for surviving in the IoT world - Radu Vunvulea
The fight for surviving in the IoT world - Radu VunvuleaITCamp
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Francesco Felicetta
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfDanishMahmood23
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingIoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingHeiko Koziolek
 
MICROCONTROLLRES NOTES.pdf
MICROCONTROLLRES NOTES.pdfMICROCONTROLLRES NOTES.pdf
MICROCONTROLLRES NOTES.pdfHitendraThakur4
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 

Ähnlich wie OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot (20)

RIOT: towards open source, secure DevOps on microcontroller-based IoT
RIOT: towards open source, secure DevOps on microcontroller-based IoTRIOT: towards open source, secure DevOps on microcontroller-based IoT
RIOT: towards open source, secure DevOps on microcontroller-based IoT
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).
 
Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3Introduction to iot and arduino uno r3
Introduction to iot and arduino uno r3
 
IoT - What is it ?
IoT -  What is it ?IoT -  What is it ?
IoT - What is it ?
 
Intenet of things
Intenet of thingsIntenet of things
Intenet of things
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
 
The fight for surviving in the IoT world
The fight for surviving in the IoT worldThe fight for surviving in the IoT world
The fight for surviving in the IoT world
 
The fight for surviving in the IoT world - Radu Vunvulea
The fight for surviving in the IoT world - Radu VunvuleaThe fight for surviving in the IoT world - Radu Vunvulea
The fight for surviving in the IoT world - Radu Vunvulea
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdf
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
IoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingIoT challenges for Smart Manufacturing
IoT challenges for Smart Manufacturing
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
MICROCONTROLLRES NOTES.pdf
MICROCONTROLLRES NOTES.pdfMICROCONTROLLRES NOTES.pdf
MICROCONTROLLRES NOTES.pdf
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 

Mehr von Pôle Systematic Paris-Region

OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...Pôle Systematic Paris-Region
 
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...Pôle Systematic Paris-Region
 
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...Pôle Systematic Paris-Region
 
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...Pôle Systematic Paris-Region
 
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyOsis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyPôle Systematic Paris-Region
 
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAOsis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAPôle Systematic Paris-Region
 
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentOsis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentPôle Systematic Paris-Region
 
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...Pôle Systematic Paris-Region
 
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...Pôle Systematic Paris-Region
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...Pôle Systematic Paris-Region
 
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...Pôle Systematic Paris-Region
 
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)Pôle Systematic Paris-Region
 
PyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPôle Systematic Paris-Region
 
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...Pôle Systematic Paris-Region
 

Mehr von Pôle Systematic Paris-Region (20)

OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
 
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
OSIS19_Cloud : SAFC: Scheduling and Allocation Framework for Containers in a ...
 
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
OSIS19_Cloud : Qu’apporte l’observabilité à la gestion de configuration? par ...
 
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...OSIS19_Cloud : Performance and power management in virtualized data centers, ...
OSIS19_Cloud : Performance and power management in virtualized data centers, ...
 
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
OSIS19_Cloud : Des objets dans le cloud, et qui y restent -- L'expérience du ...
 
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
OSIS19_Cloud : Attribution automatique de ressources pour micro-services, Alt...
 
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
OSIS19_IoT : State of the art in security for embedded systems and IoT, by Pi...
 
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick MoyOsis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
Osis19_IoT: Proof of Pointer Programs with Ownership in SPARK, by Yannick Moy
 
Osis18_Cloud : Pas de commun sans communauté ?
Osis18_Cloud : Pas de commun sans communauté ?Osis18_Cloud : Pas de commun sans communauté ?
Osis18_Cloud : Pas de commun sans communauté ?
 
Osis18_Cloud : Projet Wolphin
Osis18_Cloud : Projet Wolphin Osis18_Cloud : Projet Wolphin
Osis18_Cloud : Projet Wolphin
 
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMAOsis18_Cloud : Virtualisation efficace d’architectures NUMA
Osis18_Cloud : Virtualisation efficace d’architectures NUMA
 
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur BittorrentOsis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
Osis18_Cloud : DeepTorrent Stockage distribué perenne basé sur Bittorrent
 
Osis18_Cloud : Software-heritage
Osis18_Cloud : Software-heritageOsis18_Cloud : Software-heritage
Osis18_Cloud : Software-heritage
 
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
OSIS18_IoT: L'approche machine virtuelle pour les microcontrôleurs, le projet...
 
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
OSIS18_IoT : Solution de mise au point pour les systemes embarques, par Julio...
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
 
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
OSIS18_IoT : Ada and SPARK - Defense in Depth for Safe Micro-controller Progr...
 
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
OSIS18_IoT : RTEMS pour l'IoT professionnel, par Pierre Ficheux (Smile ECS)
 
PyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelatPyParis 2017 / Un mooc python, by thierry parmentelat
PyParis 2017 / Un mooc python, by thierry parmentelat
 
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...
PyParis2017 / Python pour les enseignants des classes préparatoires, by Olivi...
 

Kürzlich hochgeladen

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

OSIS18_IoT: La securite des objets connectes a bas cout avec l'os et riot

  • 1. Low-end IoT Devices Security with Open Source and RIOT Emmanuel Baccelli
  • 2. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 3. Context § World War III is upon us (online) § geopolitically-driven (state-driven) § profit-driven (pirates, zero-day attacks) § Personal data-hungry Behemoths are upon us § captive users, walled gardens, not necessarily secure § EU fightback: General Data Protection Regulation(GDPR) reality.ai Anonymous Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 4. Context § Extreme computing power becomes average § Now: pooledpower, from NSA to botnets & everything in between (e.g. Coinhivecovert mining ads) § Later: quantum computing? § Ubiquitous computing & connectivity is upon us § Giant cyberphysical robot § High-end IoT vs Low-end IoT Microsoft BiffTenon Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 5. IoT Hardware Low-end IoT devices - 1000x less energy than RaspberryPi - kBytes instead of GBytes of memory Internet Microcontrollers e.g. AVR (8-bit) MSP430 (16-bit) Cortex M (32-bit) MIPS … Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 6. Low-end IoT Devices : Polymorphism § Various vendors § Various architectures (8-bit, 16-bit, 32-bit) § Various low-power communication technologies (BLE, 802.15.4, DECT…) Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 7. You don’t control what you can’t program • Software platform on usual machines: Linux ü provides programmability & full control for developers & users • On low-end IoT devices? Old : Closed-source, vendor-locked software Next : RIOT & new open-source IoT operating systems O. Hahm et al. "Operating Systems for Low-End Devices in the Internet of Things: a Survey," IEEE Internet of Things Journal, 2016. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 8. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 9. RIOT Principles 9 Architecture – minimal, real-time kernel + various modules 1kB RAM and 2kB Flash on 16-bit (slightly more on 32-bit, less on 8-bit) ü Multi-threading, thread synch. with mutexes, semaphores and IPC ü Separate thread context & memory stack (but single memory space) Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 10. RIOT Principles ü Unified APIs – across all hardware (8- 16- 32-bit), even for hardware-accessing APIs; Brings code portability and minimizes code duplication; ü Vendor & Technology Independence – Vendor libraries are avoided; Design decisions don’t tie RIOT to a particular technology; ü Modularity – building blocks, to be combined in all thinkable ways; Caters for versatile use cases & memory constraints; ü Static Memory – extensive use of pre-allocated structs; Caters for reliability, simplified verification, and real-time requirements; 10 Architecture – minimal, real-time kernel + various modules Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 11. RIOT: Large Open-Source Community § 2013: started as French-German research project § 2018: more than 180 contributors worldwide § 17,000 commits and 7,200 Pull Requests § Support for 100+ types of hardware platforms § First productsshipping RIOT last year § Hundredsof related scientific publications § Yearly RIOT Summit conference next in Amsterdam, Sept. 13-14, see http://summit.riot-os.org Source:www.openhub.net/p/RIOT-OS Monthly contributors Lines of code github.com/RIOT-OS/RIOT Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 12. Some Deployments & Products Using RIOT § Telefonica (Chile): deployment in a copper mine § Cisco (USA) and Huawei (USA): test deploymentsof ICN-IoT § Algramo (Chile): deployment in fleet of cereal vendingmachines § Hamilton IoT (USA) : environment sensinghardware + cloud services § Unwired devices (Russia): LoRa communication module § Eisox (France): smart heating § Upcomingproducts § Continental / OTAkeys (Belgium): On-Board diagnostics for connected cars § Sleeping Beauty (Germany): GPS tracking device with an integrated GSM modem Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 13. RIOT Overview § Kernel Characteristics § System-level Interoperability § Network-level Interoperability § Open-source Community Aspects Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 14. RIOT: Kernel Overview Modular architecture based on a minimal, real-time kernel § Multi-threading, thread synch. with mutexes, semaphores and IPC § Separate thread context & memory stack (but single memory space) E. Baccelli et al. "RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT," IEEE Internet of Things Journal, 2018. How? üSmall Thread Control Block (TCB) üMinimized Stack Usage üSmall & fast Inter-Process Communication (IPC) üTickless, O(1) scheduler w. priorities & preemption (Note: Multi-threading is optional) Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 15. RIOT: Kernel Overview Default configuration, 2 threads: § main thread running the main function § idle thread: lowest priority üfallback when other threads are blocked/done üthe idle thread automatically switches to the lowest possible power mode § (ISR context handles external events and notifies threads using IPC) Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 16. RIOT: Kernel Overview Some numbers… On a low-end IoT device (16-bit, 8 MHz): ü Min. TCB: 8 bytes; Min. Stack Size: 96 bytes ü IPC: up to 16,000 Messages/s (~ 10k Packets/s for 802.15.4) ü Kernel: requires only 1kB RAM and 2kB Flash More numbers… ü On Cortex-M (32-bit): Kernel is 2,8kB RAM and 3.2kB Flash ü On AVR (8-bit): Kernel is 800B RAM and 4.2kB Flash Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 17. RIOT Overview § Kernel Characteristics § System-level Interoperability § Network-level Interoperability § Open-source Community Aspects Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 18. RIOT: System-level Interoperability § Core of RIOT in (ANSI) C § No macro ‘magic’ § Board/cpu/drivers abstraction layer § Well defined APIs, consistent across all supported hardware § Cherry-picking POSIX Applications Libraries xtimer, . . . Network stacks Core Network Device Drivers Sensor/Actuator Drivers Hardware sock SAUL netdevCore APIs CPU abstraction Periph APIs Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 19. RIOT: System-level Interoperability § Drawbacks: § some memory overhead, but still fits low-end IoT devices memory budget § some more work because re-implement from scratch (behind vendor header files) § Advantages: § Efficient & highly reusable code across all supported hardware § Emulation of RIOT as a Linux process § Reusabilityof well-known3rd-party tools such as gdb, valgrind, gprof… Applications Libraries xtimer, . . . Network stacks Core Network Device Drivers Sensor/Actuator Drivers Hardware sock SAUL netdevCore APIs CPU abstraction Periph APIs C, C++ (JavaScript, Rust) Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 20. RIOT: System-level Interoperability § Packages: bundling3rd-party libraries § Integrated on-the-flyat build–time § Easyto add: just requires 2 Makefiles § Patches (if needed) are typically minimal Applications Libraries xtimer, . . . Network stacks Core Network Device Drivers Sensor/Actuator Drivers Hardware sock SAUL netdevCore APIs CPU abstraction Periph APIs Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 21. RIOT: Network-level Interoperability Wired & Bus § CAN § Ethernet Low-power wireless LAN & WAN § IEEE 802.15.4 § LoRa package § BLE (work-in-progress) IP Protocols Stacks § Default stack (GNRC) § Thread (package) § lwIP (package) § OpenWSN (in progress) Experimental stacks § CCN-lite (package) § NDN-RIOT (package) Applications Libraries xtimer, . . . Network stacks Core Network Device Drivers Sensor/Actuator Drivers Hardware sock SAUL netdevCore APIs CPU abstraction Periph APIs Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 22. RIOT Overview § Kernel Characteristics § System-level Interoperability § Network-level Interoperability § Open-source Community Aspects Emmanuel Baccelli, Inria — SILECS workshop, 04.04.2018
  • 23. RIOT: Large Open-Source Community Grassroots governance by two bodies § see https://github.com/RIOT-OS/RIOT/wiki/RIOT-Community-Processes Maintainers § Status acquired via meritocracy on Github § Duties: review incomingcode contributions § Rights: can merge in the master branch Coordinators § Status granted by co-founders § Duties: strategy steering § Rights: some praise ;) RIOT e.V. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 24. AGENDA § Context § RIOT § IoT Attack Surface § Inherent Tradeoffs § IoT Security Trends Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 25. Traditional IT Attack Surface § Human vector § Misconfiguration, phishing, social engineering § 95% security incidents involvehuman error* § Hardware vector § e.g. Spectre & Meltdownvulnerabilities on recent processors: leaks breaking isolation § … and backdoors from NSA & co ? * Cybersecurity Intelligence Index, IBM, 2014. xkcd.com No 1938 Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 26. Traditional IT Attack Surface § Low-level software vector § e.g. EternalBlue vunerabilityon Windows <10 (NSA exploit turned bad, used in WannaCry) § e.g. HeartBleed OpenSSL (also on Linux!) § Fatal combination: exploit OS & network stack vulnerabilitiesto inject malicious code § High-level software vector § e.g. malicious PDF exploitingAdobe Reader vulnerabilities itsecurityguru.org Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 27. Traditional IT Attack Surface § Software supply-chain vector § e.g. backdoor hacked into software updates of Ccleaner application* § attack laced legitimate software with malware (distributedby a security company!!!) * www.wired.com/story/ccleaner-malware-supply-chain-software-security xda-developers.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 28. IoT vs Traditional IT Attack Surface § IoT~Machine-to-Machine: the human factor is less important § Single binary systems (so far) § no high-level software § Low-end memory, CPU capacities § kBytes of memory instead of Gbytes or more § MHz instead of GHz § mW or less, instead of W or more iotworm.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 29. IoT vs Traditional IT Attack Surface § IoT~giant cyberphysical robot: hacked system can cause direct physical harm ⇒ acceptable risks are changed § Sensors everywhere, all the time ⇒ scope of privacy breaches are changed § Industrial IoT applications* ⇒ required level of system availabilityis higher * AR Sadeghi et al. "Security and Privacy Challenges in Industrial Internet of Things," in ACM DAC, 2015. nbcnews.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 30. In a nutshell § Humans § Hardware § Low-level software § High-level software § Software supply-chain § Good news: § attack surface is probably smaller than usual § Bad news: § harsher contraints & potentiallymore impactful attacks § no human in the loop means its harder for some aspects (bootstrap…) Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 31. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 32. Data Economy vs Privacy The utility/privacy trade-off § Companies: § Some do not care about privacy, § Others need data to provideservices § End-users: § want services, § but want control of their privacy § How to go from here (massive data raiding) to there (user-tunable signal)? Techcrunch.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 33. (National) Security vs Privacy § From individual surveillance to mass surveillance (and back again?) § Crippling crypto to let NSA through will also let (DIY) pirates through § Unsolvable problem? Vuze.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 34. Performance vs Security 30s to verify a digital signature? § Exacerbatedon (future legacy) low-end IoT hardware § Bottomline: cat & mouse play to remain just above risk threshold § Necessary complement: IoT software updates Steve Hauptmanblog Perf. Sec. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 35. Bottomline: Functionality vs Risk § Today's IoT: not an acceptable tradeoff w.r.t. functionalities vs risks § B. Schneier: Internet of (Unsecure) Things* § Dimensions of the work needed to change that? § Improvingfunctionality § Better IoT hardware § Richer IoT software § Mitigating risks § More IoT security * https://www.rsaconference.com/blogs/bruce-schneier-talks-about-securing-the-world-sized-web-at-rsac-apj-2016 Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 36. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 37. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends § Trusted IoT Hardware § IoT Cryptography Primitives § IoT System Software § IoT Network Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 38. IoT: The Hardware Vector § Various categories of attacks § invasive hardware attacks § reverse engineering attacks § side-channel attacks § Information gained with timing information, power consumption, electromagneticleaks, speculative execution, caching… ⇒ But not the focus in this talk Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 39. Trusted Execution on IoT Hardware § Principle: secure area of a processor for isolated execution, integrity of trusted applications & confidentiality of their assets § Sancus* on MSP430 16-bit microcontrollers(OpenMSP430) § Prototype isolating software components via memory curtaining § Added MMU and crypto HW unit on openMSP430 (open source!) § Text/Data/ProgramCounter states monitoring/matching, per software component § Remote attestation & authenticates communication with software component § HW crypto enables key derivation per software component § Sancus2.0 tested in automotivecontext. Claims only 6% energy overhead § Similar: TrustZone for popular ARM Cortex-M 32-bit microcontrollers § Upcoming Cortex-M33 and Cortex-M23 micro-controllers * J. Noormans et al. 'Sancus 2.0: A Low-Cost Security Architecture for IoT Devices', ACM Transactions on Privacy and Security, 2017 Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 40. Trusted Execution on IoT Hardware § TEEP working group at IETF * § Context: delete, update applications running in the TEE § Goal: communicationbetween the TEE, a relay outside TEE & a remote server ⇒ Trusted execution environment protocol (TEEP) Side note: installingnew software in the TEE increases attack surface… * https://datatracker.ietf.org/wg/teep/documents/Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 41. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends § Trusted IoT Hardware § IoT Cryptography Primitives § IoT System Software § IoT Network Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 42. IoT Crypto Primitives § Devices deployed now will last for years § Maybe decades! § MSP430 runs 12 years on an AA battery. § Energy harvesting § Future-proof crypto is thus crucial. Quantum resistance? § Trade-off: key & signature size vs speed * § ex. ECC 256b key vs McEliece 500kB key § ex. ECC 80B signature vs MQDSS 40kB signature * S. Samardjiska 'Post Quantum Cryptography for the IoT,' RIOT Summit, 2017Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 43. IoT Crypto Primitives It is neverthelesspossible to prepare IoT crypto for post-quantum now § symmetric crypto needs upgrade but same security =~ double key size § asymmetric crypto § some techniques would break entirely (e.g. RSA?) § some techniques are quantum-resistant(hash-basedsignatures…) § NIST lightweight crypto effort recently launched * § Upcoming: profiles based on communityresponses to reports/questions § (Conspiracytheory: baked-in backdoors ?) * K.A. McKay 'Report on Lightweight Cryptography,' NIST Report NISTIR 8114, 2017Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 44. IoT Crypto Primitives § IoT Symmetric Crypto § IoT Asymmetric Crypto § Operations over Encrypted IoT Data Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 45. IoT Symmetric Crypto § Symmetric = same key everywhere. More flexible primitives: SHA-3’s sponge construction* for hashing § Easyto (re)configure securitylevel § Just vary capacity c § Shared code to providevarious functions § Pseudo-random number generator § Message authentication code (MAC) § Stream encryption § (more with the duplex construction) § On-going workexperimentalworkto evaluate this prospect on top of RIOT G. Van Assche 'Permutation-based cryptography for the IoT,' RIOT Summit, 2017. * G. Bertoni et al. 'Cryptographic sponge functions’, 2011.Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 46. IoT Asymmetric Crypto § Symmetric crypto: § communicating entities need a shared secret (the key) ⇒ key distribution problem, Pre-Shared Key (PSK) is norm on IoT § Asymmetric crypto with public/private keys: § Public Key Infrascruture (PKI) solves key distribution § Public key allows digital signatures Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 47. IoT Asymmetric Crypto Smaller & faster crypto § more efficient implementation § tweetnacl (Bernstein et al.): Source funnily fits in 100 tweets, using curve25519 § more efficient algorithms § uKummer *: Smarter use of algebraic geometry § software-onlyhyperellipticcryptographyon constrained platforms § demonstratedon AVR 8-bit and ARM Cortex-M 32-bit § up to 70% faster & 80 % smaller compared to using curve25519 § qDSA **: even smaller stack & code size * J. Renes et al. ‘μKummer: Efficient hyperelliptic signatures and key exchange on microcontrollers’, CHES, 2016. ** J. Renes, B. Smith ‘qDSA: Small and Secure Digital Signatures with Curve-based Diffie–Hellman Key Pairs’, ASIACRYPT 2017. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 48. IoT Asymmetric Crypto Humans (even if very skilled) make buggy code § Formally verified crypto code § HACL* library: written in F* programming language, § F* code formally verified (memory safety, mitigations against timing side-channels, and functional correctness) § F* code then compiledto readable C code § Elements of HACL* already in Firefox (Quantum, latest verion) § Elements of HACL* currently integrated into RIOT * JK Zinzindohoué et al. ‘HACL*: A verified modern cryptographic library,’ ACM CCS, 2017Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 49. Operations over Encrypted IoT Data The cloud, or the server hosting IoT database may not be trusted ⇒ Nevertheless it may be required to (batch) process IoT data § Use of partially homomorphic crypto § Talos and Pilatus prototype platforms * § Allows some operations (range, sum) over encrypted data § Using Elliptic-CurveElGamal crypto-system (instead of Paillier) § Encryption by low-end IoT devices themselves (demonstrated on Cortex-M3) * H. Shafagh et al. 'Secure Sharing of Partially Homomorphic Encrypted IoT Data,' ACM SenSys, 2017 Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 50. Operations over Encrypted IoT Data § Body of work on differentialprivacy in the field of smart metering * § Followedseminal work from Dwork in 2006 § Principle: add (some) noise to IoT data points § Differential guarantee = analysts draws same conclusions about an individual whether the individualincludeshimself in the dataset or not § Still able to extract coarse signal from aggregate data (e.g. mean, average…) § No privacy violation in practice * V. Rastogi et al. ‘Differentially Private Aggregation of Distributed Time-Series with Transformation and Encryption’, ACM SIGMOD 2011. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 51. AGENDA § Context § IROT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends § Trusted IoT Hardware § IoT Cryptography Primitives § IoT System Software § IoT Network Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 52. IoT System Software * O. Hahm et al. "Operating Systems for Low-End Devices in the Internet of Things: A survey," IEEE Internet of Things Journal, 2016. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 53. Trusting IoT Software (a priori) Providing guarantees on software components of IoT operating systems? § Tock OS * isolates software faults & manages dynamic memory for applications § use of memory protection unit (MPU) of Cortex-M4 and of Rust programming language § Rust enables memory-safety & type-safety while providingperformance close to C § MPU enables isolation of processes from the kernel and from each other § Proven C code generated from F* § Potential use to provide RIOT components other than the HACL crypto library? * A. Levy et al. 'Multiprogramming a 64 kB Computer Safely and Efficiently,' ACM SOSP, 2017.Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 54. A posteriori: IoT Software Updates Internet/cloud Border router: Connects device to the Internet IoT device: Developer: Update Server: Builds, signs & uploads updates stores updates & serves them to IoT devices Downloads, verifies and boots updates Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 55. Full IoT Software Updates: Firmware Updates You thought you were tight w.r.t. memory? Memory must be further split : § Bootloader § (e.g. minimalistic config or RIOT) § Several OS Images § Typically need >2 for roll-back § Metadata § IETF working group SUIT working on standardizing metadata for IoT firmware * OS Image 2 OS Image 1 Bootloader Metadata Metadata * https://datatracker.ietf.org/group/suit/documents/Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 56. Partial IoT Software Updates Various approaches: § differential updates of arbitraryparts of the binary ⇒ Efficient but risky § modular program & dynamic binary module loading ⇒ More robust but more complex § use interpreted languages (instead of compiled) ⇒ Elegant but interpreter overhead Runtime .js container demonstrated to work on Cortex-M based low-end IoT devices with RIOT * ⇒ explore sandboxing properties of this contruct? OS Image * E. Baccelli et al. "Scripting Over-The-Air: Towards Containers on Low-end Devices in the Internet of Things," IEEE PerCom, 2018. Efficiency of firmware updates? ⇒ try partial software update Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 57. Trusting IoT Software Supply Need to verify legitimacy of software updates! § SUIT working group at IETF: metadata format + signatures etc. for IoT firmware § https://datatracker.ietf.org/group/suit/documents/ § CHAINIAC * decentralized frameworkto verify software update legitimacy § source code & binaries with reproduciblebuilds § collective signing & blockchain-like decentralizedconsensus on release history Side note: enforcing legitimacy can turn bad -- beware of TreacherousComputing (R. Stallman) * K. Nikitin et al. ‘CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds,’ USENIX Security Symposium, 2017. xda-developers.com Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 58. AGENDA § Context § RIOT § IoT Attack Vectors § Inherent Tradeoffs § IoT Security Trends § Trusted IoT Hardware § IoT Cryptography Primitives § IoT System Software § IoT Network Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 59. IoT Communication Protocol Stack Often wireless, seldom wired IEEE 802.15.4 IPv6 RPL BLE UDP CoAP LWM2MContent Aware Medium Access Transport Routing Network Physical … LoRa … 6LoWPAN ProtocolsLayers Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 60. IoT Communication Protocol Stack § Types of Attacks: (D)DoS, man-in-the-middle attacks… ⇒Need for Authentication, Authorization, Integrity, Confidentiality, Bootstrapping Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 61. IoT Communication Protocol Stack Content Aware Medium Access Transport Routing Network Physical SECURITY DTLS (over UDP) for confidentiality, integrity, authenticity with public/private keys OSCORE end-to-end encryption, integrity, & replay protection for CoAP (header/payload) (IPsec, routing protocol security…) Link-layer security sublayer for authentication, confidentiality, with symmetric keys Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 62. IoT Network Protocol Security § IoT link-layer security: filter legit packets early on § TypicallyAES, 128 bit, in hardware ⇒ HW acceleration helps mitigate DoS attacks (low-end CPU, easily overwhelmed) § Routing security: avoiding sinkholes § e.g. TRAIL routing topologyauthenticationfor RPL* * H. Perrey et al. ‘TRAIL: Topology authentication in RPL’, arXiv, 2013Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 63. IoT Network Protocols § Channel security: end-to-end confidentiality, integrity, authenticity § From DTLS 1.2 to 1.3 § New handshake: shorter message exchange § Removed weak/old crypto § https://tools.ietf.org/html/draft-ietf-tls-dtls13 § Object security: end-to-end security beyond TLS § OSCORE in-layer security for CoAP over foo § CoAP and HTTP proxies require (D)TLS to be terminatedat the proxy… § https://tools.ietf.org/html/draft-ietf-core-object-security-08 § Information-centricvs machine-centricnetwork architecture § Novel paradigm Information-centric networking (ICN) yields natural object security § Recent work on named-data networking (NDN) applied to IoT Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 64. IoT Network Protocols § Scalable & secure IoT device on-boarding § IoT device bootstrap with zero user interaction, for hundreds of devices ? § Studies on pairing based on (matching) ambient data * * M. Miettinen et al. 'Context-based zero-interaction pairing and key evolution for advanced personal devices,' ACM CCS, 2014. Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018
  • 65. In a nutshell… § IoT security has numerous aspects § Hardware § Algorithmic primitives § Software (incl. supply-chain) § Network § RIOT § Enables end-to-end open source § Aims to bundle bleeding-edge security § Provides a solid base for future-proof IoT Emmanuel Baccelli, Inria — FU Berlin, 18.04.2018