Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Great ideas, big data and little privacy? Bart Preneel iMinds and COSIC KU Leuven 2 3 NSA calls the iPhone users public 'zombies' who pay for their own surveillance 4 Snowden revelations • NSA: “Collect it all, know it all, exploit it all” • most capabilities could have been extrapolated from open sources • But still… • massive scale and impact • redundancy: at least 3 methods to get to Google’s data • many other countries collaborated (beyond five eyes): economy of scale • industry collaboration through bribery, security letters, 5 Snowden revelations (2) • Most spectacular: active defense • networks • Quantum insertion: answer before the legitimate website • FoxAcid: specific malware • devices • supply chain subversion • Translation in human terms: complete control of networks and systems, including bridging the air gaps • No longer deniable 6 Lessons learned • Never underestimate a motivated, well-funded and competent attacker • Pervasive surveillance requires pervasive collection and active attacks (also on innocent bystanders) • active attacks undermine integrity of and trust in computing infrastructure • Economics of scale play a central role: • it is not about the US or US/UK or even five eyes • other nations have or are developing similar capabilities • organized crime and terrorists working on this too 7 The state of cybersecurity • Governments are undermining ICT systems rather than improving cybersecurity (and part of industry is helping) • Problems at network level • • • • end-to-end deployment of encryption meta data: IP address, location, … network protocols such as BGP, DNS Problems at system level: • • • secure execution and update supply chain security 0-day market 8 IoT security risks • More pervasive and intrusive: building, car, body • • • • low cost larger attack surface harder to update Security • • • • bringing down the grid hacking cars and drones burglary hacking medical devices 9 OWASP IoT top 10 2014 https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project • • • • • • • • • • 1 Insecure Web Interface 2 Insufficient Authentication/Authorization 3 Insecure Network Services 4 Lack of Transport Encryption 5 Privacy Concerns 6 Insecure Cloud Interface 7 Insecure Mobile Interface 8 Insufficient Security Configurability 9 Insecure Software/Firmware 10 Poor Physical Security 10 IoT privacy nightmare? • • • What is privacy? What are the limitations of the current approach? What are the risks? HP IoT study: 90% of devices collected at least one piece of personal information via the device, the cloud or its mobile application 11 What is privacy? • Abstract and subjective concept, hard to define • Depends on cultural aspects, scientific discipline, stakeholder, context • Conflicts are inherent discretion transparency harmony social control 12 Legal approach • Data controller: trusted • Limited purpose: can be hard to define • Consent: how will this work in IoT? transparency discretionIrish privacy commissioner here harmony social control 13 Privacy problems • • • • • • Data breaches Profiling Discrimination Manipulation Prediction Mass surveillance 14 Architecture is politics [Mitch Kaipor’93] Need to rethink centralized architectures with massive storage of raw data (designed for advertising/search/cost) Avoid single point of trust that becomes single point of failure 15 Governance and Architectures: Back to principles • Data minimization through infrastructure • Minimum disclosure: avoid centralized massive amounts of data • “cryptomagic” • local computations with proof of security • centralized storage but encrypted under local key (can still do computations!) 16 Open Solutions Open source solutions with effective governance • who adds code • who does code reviews 17 Conclusions • • • • • IoT technologies bring major privacy and security risks • we cannot afford to continue the “deploy now and fix later” model Need to rethink everything • architectures: where is the data? • building blocks • deployment (including supply chain) • update mechanisms Need open solutions with open audit Support: legislation (economic incentives) and non-proliferation treaties Essential to maintain our European sovereignty and values 18 CONTACT DETAILS Bart Preneel, iMinds and COSIC KU Leuven ADDRESS: WEBSITE: EMAIL: TELEPHONE: Kasteelpark Arenberg 10 Bus 2452, 3000 Leuven homes.esat.kuleuven.be/~preneel/ [email protected] +32 16 321148 www.facebook.com/iminds @iminds 19 THANK YOU FOR YOUR TIME