andrew@theinternet

ICPSS Lecture Notes - Lesson 14 - Threats to CPS in Other Domains

Threats to CPS in Other Domains

Health Care and Medicine

  • For our purposes, these domains consist of:
    • Monitoring health conditions of the patients and taking necessary actions
    • Technologies related to home care, assisted living, smart operating rooms, smart medical devices, and smart prescriptions

Security and Privacy in Implantable Medical Devices

  • In 2001, the estimated number of patients in the United States with an iimplantable medical device (IMD) exceeded 25 million

Example Study

  • A 2008 study analyzed the security and privacy properties on an implantable cardioverter defibrillator (ICD)
    • This model of ICD includes pacemaker technology and is designed to communicate wirelessly with a nearby external programmer in the 175kh frequency range
    • The security and privacy properties of a common ICD were assessed and attacks on privacy, integrity, and availability were conducted
  • What is an ICD?
    • An ICD is a device that monitors and responds to heart activity
    • ICDs have modes for pacing, wherein the device periodically sends a small electrical stimulus to the heart, and for defibrillation, wherein the device sends a larger shock to restore normal heart rhythm
    • A physician surgically implants the ICD below the patient’s clavicle and close to the skin. The physician also implants electrical leads that connect the ICD to the heart muscle
    • Post-surgery, a health care practitioner can use an external programmer to perform diagnostics, read and write private data, and adjust therapy settings
    • A malfunctioning or maliciously configured ICD could harm a patient in multiple ways
    • Inside the ICD is a magnetic switch. A magnetic field in proximity to this switch causes it to close, which in turn causes the ICD to wirelessly transmit telemetry data, including electrocardiogram (EKG) readings
    • The ICD wirelessly communicates with the external programmer using the 175kHz band, which is intended for short-range communications
  • The researchers reverse-engineered the communication protocol for the ICD, and implemented several software-radio-based attacks
    • Multiple impacts demonstrated. Basically a fish in a barrel scenario.

Intelligent Transportation

  • Medium/large scale
  • Improving safety, coordination, and services in traffic management and real-time info sharing
  • Many benefits to both efficiency and safety

Attacking Vehicle Advanced Driver Assistance Systems

  • In 2016, researchers presented a study demonstrating attacks against these systems
  • To minimize accidents and improve the driving experience, various advanced driver assistance systems (ADAS) have been created
  • Attacks on ADAS are emerging
  • Attacks utilize the underlying principals of sensors to blind or deceive them, e.g. exploiting the active probing mechanisms that are used to detect barriers
    • Vehicle ADAS tricked into believing objects in the vehicle’s way are no longer there, or tricked to make obstacles appear

Vehicle Sensors

  • Ultrasonic sensors
    • Proximity – 2m
    • Proximity sensors that aim at detecting barriers within several meters from a car body. They are mainly designed for low speed scenarios, e.g. parking assistance
  • Forward-looking cameras
    • Short Range – 30m
    • Used for lane departure warning, traffic sign recognition, and backward cameras for parking assistance. Short-range Millimiter-wave (MMW) radars (Short-range radar, SRR) serve for blind spot detection and cross traffic alert
  • LiDAR and medium-range MMW radars (Medium-range radar, MRR)
    • Medium Range – 80-160m
    • Operate in medium range and assist collision avoidance and pedestrian detection
  • Long-range MMW radars (Long-range radar, LRR)
    • Long Range – 250m
    • Designed for Adaptive Cruise Control (ACC) at high speeds

What is Required for Sensor Attacks?

  • Sensors relying on distinctive physical principles require different equipment
  • Ultrasound transceivers used in exploit against ultrasonic sensors
  • Radio frequency (RF) transceivers used in exploit against MMW radars
  • Lasers used in exploit against cameras
  • No physical contact with the targeted sensors, thus the attacks were “contactless” img
  • This study launched both “spoofing” and “jamming” attacks
    • Spoofing attacks involved emitting carefully crafted signals similar to the real signals transmitted to the sensors normally. Thus the sensors interpreted the spoofed signals as real ones, and responded accordingly.
    • Jamming attacks involved a very strong signal, which interfered with the real ones.