25 research outputs found

    D2.3 CySiMS Cyber Event Exercise Handbook

    Get PDF
    This document is a handbook for developing cyber event exercises relevant for the intended users of the CySiMS-SE secure communication solution. The document includes a selected set of scenarios that are relevant to prepare for, including both the enrolment of ships into the PKI and the use of the PKI to secure maritime communication. The document also provides two examples of exercises. ISBN: 978-82-14-06463-6publishedVersio

    SMS-based One-Time Passwords: Attacks and Defense

    Get PDF
    SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other attacks against Internet services such as online banking. Today, SMS OTPs are commonly used for authentication and authorization for many different applications. Recently, SMS OTPs have come under heavy attack, especially by smartphone trojans. In this paper, we analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services. We determined that the two foundations SMS OTP is built on, cellular networks and mobile handsets, were completely different at the time when SMS OTP was designed and introduced. Throughout this work, we show why SMS OTP systems cannot be considered secure anymore. Based on our findings, we propose mechanisms to secure SMS OTPs against common attacks and specifically against smartphone trojans

    Experimental Security Analysis of Connected Pacemakers

    Get PDF
    Medical devices and their connectivity capabilities are providing a variety of benefits to the healthcare domain, including remote monitoring, automated alerts, and improved patient outcomes. However, these medical devices introduce a range of new potential cyber security risks when connected to the Internet, affecting the patient or the healthcare infrastructure. In this paper, we systematically analyze the security issues of connected pacemakers. In particular, we use a black box testing methodology against a commercial pacemaker device and the network infrastructure. Our main objective is to understand how the data is sent from a bedside monitor in the patient’s home to the backend server hosted by the pacemaker manufacturer, and whether or not this data is protected from a cyber security perspective. To do so, we leveraged several hardware related vulnerabilities found in the bedside monitor to obtain the firmware of the device and then reverse engineered the proprietary communication protocol. We demonstrate how vulnerabilities in this protocol can be leveraged to allow an attacker to perform a man-in-the-middle attack on the pacemaker.publishedVersio

    On the Certificate Revocation Problem in the Maritime Sector

    Get PDF
    Maritime shipping is currently undergoing rapid digitalization, but with increasing exposure to cyber threats, there is a need to improve the security of the ship communication technology used during operations across international waters, as well as close to local shores and in ports. To this aid, there are ongoing standardization efforts for an international maritime Public Key Infrastructure, but the inherent properties of limited connectivity and bandwidth make certificate revocation a problematic affair compared to traditional Internet systems. The main contribution of this paper is an analysis of certificate revocation techniques based on how they fulfil fundamental maritime requirements and simulated usage over time. Our results identify CRLs (with Delta CRLs) and CRLite as the two most promising candidates. Finally, we outline the pros and cons with these two different solutions.publishedVersio

    What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios

    Get PDF
    The modernisation of the power grid is ongoing, and the level of digitalisation of the power grid in, say, ten years may be quite different than today. Cyber security needs will change correspondingly. In this paper we utilise a qualitative research approach to explore misuse cases related to three main areas of modernisation that we envision for the next ten year period: 1) managing flexibility in the TSO-DSO relation, 2) smart distribution grids, and 3) microgrids. The misuse cases represent potential security challenges to be considered when working on modernising the grid, however they are not exhaustive. The misuse cases presented in this paper can contribute to identifying security requirements, thus reducing associated cyber risks, and assist in development of new cyber security mechanisms for the next-generation power grid employing digitally-connected, self-healing, and automation characteristics.acceptedVersio

    Tool-assisted Threat Modeling for Smart Grid Cyber Security

    Get PDF
    Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool assisted threat modeling has seen limited use in complex cyber physical systems involving both Information Technology (IT) and Operational Technology (OT) systems. In this paper, we investigate the applicability of tool-assisted threat modeling to the complex cyber-physical system that is the smart grid, and present a new Smart Grid template for the Microsoft Threat Modeling Tool. We demonstrate benefits of our smart grid threat modeling template on a use-case, and discuss limitations.acceptedVersio

    D4.3 Multi-modal communication - Securing future communication across different sectors and technologies

    Get PDF
    This document introduces the concept of multi-modal communication, using the coordination of a Search and Rescue (SAR) operation as an illustrating scenario, identifies challenges for secure information exchange and outlines the way forward. ISBN: 978-82-14-06462-9publishedVersio

    Operator-based over-the-air M2M wireless sensor network security

    Full text link
    Abstract—We describe a novel method for over-the-air au-tomated authentication and verification of machine-to-machine (M2M) wireless sensor networks using the existing authentication assets of a cellular telecom operator. We extend the standard Generic Bootstrapping Architecture (GBA) provided in the 3GPP specifications to implement our solution with minimal additional hardware and software requirements. I
    corecore