-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Paper Discussion 10b: Risks of Trusting the Physics of Sensors #80
Comments
Reviewer: Ratnadeep Bhattacharya Main Problem Solved Anyhow, the paper talks about transduction attacks which exploit a vulnerability in the physics of the sensor to introduce intentional errors. Main Contributions Threats: Thieves can break into cars using Man-in-the-Middle (MITM) attacks against keyless entry systems. However, transduction attacks use unintended functions of the circuitry to threaten the integrity of a system. We will come back to MITM that can be done with transduction attacks. Two types of analog threats: DolphinAttack: MEMS (microelectromechanical systems) can hear ultrasound despite efforts to attenuate them which can make voice recognition systems execute phantom commands. Malicious Backdoor Coupling: It’s a signal that enters the system indirectly by coupling to its wires or other instruments. As an undergrad, I spent a lot of time studying high voltage power transmission. There are these backdoor couplings all over electrical systems. For example, high voltage power lines generate very strong magnetic fields that directly couple with telephone lines distorting telephone conversation. Another example of such indirect coupling can be found in optical network cables. Only a slight bend in the cable is enough to leak the light from the glass into the insulating sheath distorting the system. Furthermore, light is essentially an electromagnetic signal. The magnetic field can extend outside the wires and can be coupled with equipment that is sensitive enough in order to execute MITM attacks. A possible example of resonance attacks Software Security Tools are not geared towards preventing transduction attacks. Questions |
Reviewer: Henry JaenschReview Type: Critical ReviewProblem Being SolvedCyber physical systems rely on sensor readings to do useful work. Sensors are an important part of the feed back loop between sensors and actuators. Standard security mechanisms exist to prevent against software based attacks. This model assumes that sensors can be trusted completely. This creates an avenue for attack that is referred to as a transduction attacks. These attacks take advantage of the physical materials used to make sensors. For example emitting a wave that oscillates at the resonant frequency of an accelerator can manipulate it's output. Main ContributionsThis paper provides an evaluation of how some of these attacks work and some ways that these attacks can be prevented. Examples of attacks include submitting voice commands to voice assistants using ultrasonic waves, or even spoofing sensors that do object detection on a Tesla. The implications of these attacks are widespread and potentially deadly. This paper identifies that while there are some preventative measures that can be implemented in software - checking sensor results - a lot can be done on the manufacturing side to prevent sensor attacks. The paper also acknowledges that education and critical team composition choices can help to prevent attacks like these. Even having an engineer recognize that components being used to make a system pose potential risks could avoid some of these issues. Questions
Critiques
|
Reviewer: Cuidi Wei Problem being solved Main contributions Questions and Critiques
|
Reviewer: Eric Wendt Summary Main Contributions Questions
|
Reviewer: Becky Shanley Problem Being Solved Main Contributions Questions
Critiques
|
Reviewer: Tuhina Dasgupta Problem: Contributions: Questions:
Critiques:
|
Reviewer: Pat Cody Problem Being SolvedMany IoT systems suffer from security flaws inherent in the physical properties of the sensors, rather than insecure code. This opens these systems up to a transduction attack, whereby a vulnerability in the physics of a sensor are exploited. Main ContributionsThis paper highlights the danger of blindly trusting components in an embedded system, as physical sensor properties can be exploited to create bad readings, even when the code is written correctly. It proposes several methods to mitigate these security vulnerabilities, namely by reducing the trust placed in each sensor component. It also discusses improving the education of engineers to be more well-rounded, and not just specific to writing software or making hardware, but a mix of both. Questions
Critiques
|
Reviewer: Rachell Kim Problem Being Solved: This paper discusses the threats against physical sensors and the pitfalls of trusting the physics of sensors within embedded devices. More specifically, the paper discusses transduction attacks performed against sensors that allow adversaries to manipulate output data and mechanisms to prevent such attacks. Main Contribution: The authors of this paper survey various vulnerabilities of physical sensors within embedded systems and suggest a few security measures to improve resilience against transduction attacks. Namely, they suggest techniques from embedded security as well as consumer side modifications to better improve overall system reliability. Questions:
|
Reviewer: Greg KahlReview Type: ComprehensiveProblemMany embedded systems trust the inputs they receive from secure sensors, however there are ways to physically interfere with sensors, that may be considered secure, to change the data they receive and send to the system. ContributionThis paper discusses the ways that sensor data can be manipulated by outside influence, such as transduction attacks which take advantage of the physics of the sensor to interfere with the data being received using a different observable medium. An example of this is using resonant audio frequency to interfere with accelerometer data. Another transduction attack takes advantage of the coupling in the wires of the sensor to spoof or jam data readings. The paper explores the ways that the physics of the sensors can be abused to change data, and a couple approaches which have been explored to try and create secure sensors or monitor when they are being tampered with. Questions1 - They discussed having sensor output continuously checkable, but how does checking the data continuously let you know whether the data being received is valid or not? In the example of the Telsa obstacle detection, how would checking the data continuously tell them if there really is an obstacle or if it is being spoofed? |
Reviewer: Michael Hegarty ProblemCyber physical systems rely on sensors to give them important and timely information about the environment. Sensors, similar to communication protocols, can be subjected to a variety of different types of attacks on them that can prevent or modify the information that they transmit. These attacks, unlike communications attacks, cannot be prevented in software by something like encryption, leading to new challenges that must be addressed in the IoT field. ContributionThe paper lists a variety of different vulnerabilities that can occur in sensors, and gives board advice about how they should be handled and about the future of embedded systems. They categorize the attacks into two groups, front-door attacks and back-door attacks. Front-door attacks occur from inputs that the sensor is designed to capture, such as using ultrasound to send voice commands to a voice activated device. Back-door attacks occur from sensors picking up information from a source that they were not designed to gather information from, such as sound wave sent at a resonant frequency being able to affect an accelerator. They recommend some ways to combat these systems such assuming sensor inputs to be untrustworthy and considering security when assembling the actual circuit board of the sensor. Questions
Critiques
|
Reviewer: Andrew Nguyen ProblemSensors are transducers that find themselves commonplace in necessities within the technological realm of things in many everyday devices, machines, and equipment. Because of this, there is a large risk for attacks dedicated to these things. The plethora of sensors deployed now in the world make it a large risk for various people and entities due to the newfound emergence of sensory-dedicated attacks. As a result, this paper dives into the various examples of attacks and some of the methods used to mitigate it and nonetheless provide insight to the reader for it. ContributionFirstly, sensors face two types of analog attacks, the first being opportunistic attacks that require no special equipment to tap into the sensors' vulnerabilities, and second, advanced attacks that would trick the user or prompt them to engage with the attack in some way or another. Back-door attacks are also dangerous types of attacks due to the idea of back-door coupling and its ability to have the sensory disruptive waves override actual necessary functions of a device. Implementing trustworthy embedded systems would be the solution. The key criteria for this are:
Questions
### Critiques |
Reviewer: Gregor PeachReview Type: Critical ReviewProblem Being SolvedWhen building software that runs on microcontrollers, our software has to be made secure--we understand this. But often programmers forget about the physical security properties of the system. While unfettered physical access may always lead to device compromise, we need to be cognizant of our security model. How can we deal with sensor fraud and Main ContributionsThis short article outlines the basic problems with blindly trusting sensors, then outlines some potential solutions to them. (Short article.) Questions
Critiques
|
Shared concerns:
The text was updated successfully, but these errors were encountered: