10
Securing Device and Network Communications: the CoNSEL Lab @ TAU/EE Prof. Avishai Wool : School of Electrical Engineering, Tel Aviv University

Securing Device and Network Communications: the CoNSEL Lab @ TAU/EE

  • Upload
    vaughan

  • View
    46

  • Download
    1

Embed Size (px)

DESCRIPTION

Prof. Avishai Wool :. Securing Device and Network Communications: the CoNSEL Lab @ TAU/EE. School of Electrical Engineering, Tel Aviv University. Who we are. Prof. Avishai Wool Ph.D. Student Amit Kleinman M.Sc. Students: Dvir Schirman Noam Erez Asaf Tzur Ofir Weisse. - PowerPoint PPT Presentation

Citation preview

Page 1: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

Securing Device and Network Communications: the CoNSEL Lab @ TAU/EE

Prof. Avishai Wool: 

School of Electrical Engineering, Tel Aviv University 

Page 2: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

2

Who we are

Prof. Avishai Wool

Ph.D. Student Amit Kleinman

M.Sc. Students: Dvir Schirman Noam Erez Asaf Tzur Ofir Weisse

Undergradute student Gal Lerner

Many past members

Page 3: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

3

What we do (2013 snapshot)

Control networks SCADA: On-going

Wireless Security: RFID: Prox-cards (payments, access systems,

passports, Israeli e-voting)

Side-channel cryptography

Other projects: RFID: EPC-Gen2 (product labels) Bluetooth, anti-malware, OS, file systems, …

Page 4: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

Example – Power Plant (Coal)On the outside

Industrial Sketch

Page 5: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

5

On inside: Typical Components

HMIModbus/TCP (e.g. over Ethernet)

Page 6: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

6

SCADA network security

Industrial control systems (energy, chemical, …)

Control protocol is not protected Access to control net “Pwn” all PLCs

Our work: analyze & model Modbus/TCP protocol Identify designs for accurate IDS systems Experiment [TAU has a live Modbus

network!]

Page 7: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

7

RFID Prox-card technology

5cm range Access systems, transportation,

credit cards, passports, Israeli e-vote

Relay attacks (Extended-range) Jamming card-to-reader range extension

Page 8: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

Range extension attacks

5 cm

HF RFID Reader HF RFID Tag

Leec

h

GhostRe

lay

Extended range

Leech

Extended range

Ghost

Page 9: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

9

Side-Channel Cryptanalysis Devices include secret cryptographic keys

Car alarm systems (keeloq), Cellular SIM cards, …

With device in lab, collect input+output pairs … plus side channel

E.g., Power consumption trace sampled by scope Extract secret keys

Our work: algorithms that need very few traces, and can deal with measurement error

Page 10: Securing Device and Network Communications: the  CoNSEL  Lab @ TAU/EE

10

Questions?

Contact: [email protected] http://www.eng.tau.ac.il/~yash