SlideShare a Scribd company logo
Gianluca Varisco, CISO Arduino
Paris Open Source Summit - 10/12/2019
The evolving (IoT) security
landscape
@gvarisco
TODAY FORMERLY
Who am I? @gvarisco
Enabling anyone
to innovate by
making complex
technologies
simple to use.
Developing secure and reliable IoT
applications can be hard
Hardware
Nodes (Devices, Sensors)
Constrained devices
Require C/C++ firmware skills
Effective Power Management
depends on Firmware
Gateways
Remote connections, SSH
Device management
Radio / Networks
Long range / Low Power
Source:
https://makezine.com/2017/06/27/state-boards-platforms-pro
ducts-purposes-current-crop-microcontrollers-vies-attention/
Cloud Software
Many different
languages, protocols,
libraries, security
standards, etc.
Data & persistence
Different data formats
make data manipulation
and interpretation
difficult
8
The IoT Landscape is quite fragmented
9
The IoT “Line of Insanity”™
We are drowning in technology.
We are not becoming more secure.
11
− Not realizing to be potential targets
− Treating cybersecurity as an IT
problem
− Thinking threats are only external
rather than internal or accidental
− Thinking the cloud provider is in
charge of data/infra security (oh,
and backups!)
− Not using properly their e-mail
infrastructure, especially if managed
by 3rd parties
We are wasting billions to “defend
ourselves” from APTs. Buying
Next-Gen appliances. Following
predictions and hypes.
Don't be scared to go back to
basics with your cybersecurity
strategy.
Many of us are still making the same, old mistakes
12
− PERVASIVENESS: You won’t have one IoT device, you’ll have ten.
− That’s a lot of new attack surface to your life and/or business
− UNIQUENESS: IoT devices are a wild-west of mixed technologies.
− How do I patch firmware on these dozen devices?
− Which random vendor made the HW inside the device?
So? What’s wrong in IoT?
13
− ECOSYSTEM: Your vendor may be leveraging six other vendors
− Where’s your data going once it enters that IoT device?
− Who has access to your network via proxy connections?
So? What’s wrong in IoT?
14
Why does it matter?
15
IoT vs Web Stack
16
IoT attack surface identification
Source: Security Innovation
17
IoT: assessing the risks
Source: Security Innovation
18
− Insufficient Security training
− Humans #1 weak point: building,
deploying, using
− Weak Physical Security
− Debug interfaces (JTAG, UART, etc.) and USB ports allow unintended
device or data access
− Infrequent updates
− Firmware, device apps, admin apps/interfaces
− Expensive and/or remote IoT devices long lifespan (difficult to
update)
TOP 4 IoT Security Risks
19
− Weak Data Protection
− Data at rest/transit uses weak encryption techniques
− Lack of dedicated security chips and modules to store sensitive data.
TOP 4 IoT Security Risks
20
− Privacy
− PII leakage
− Mass surveillance
− Stalking
− Theft
− Data breaches
− Liability
− Reputation
− Botnets, e.g. Mirai, for mass hacking
End-user risks
IoT Security Excuses
(aka #YOLOSEC)
22
− Vulnerabilities bypassing password protection:
− Memory corruption issues (Buffer Overflow, Format String, etc.)
− CSRF
− Backdoor accounts
− Lack of brute-force protection
I am safe, I changed all my passwords
23
− Patches are often late by years
− Many IoT devices do not get a patch, ever
I am safe, I regularly patch all of my IoT devices
24
− If your IoT device has an Internet routable IPv4(/v6) address, without
any firewall port filtering:
− Just prepare for apocalypse
− Seriously, don’t do that
− CCTV is OCTV today
Problems with direct IPv4(/v6) connection
25
The IoT device is only available in a closed network
26
The device is only exposed in my area (physically)
27
− NAT is sneaky evil
− Users believe they are safe behind home router NAT
− Developers created ways to connect devices behind NAT, seamless
I am safe, home network, behind NAT
28
Think again:
− UPNP
− IPv6
− Teredo (encapsulates IPv6 packets within UDP/IPv4 datagrams)
− Cloud
I am safe, home network, behind NAT
29
Lateral movement
For the next 5-10 years, assume
your IoT device has horrible
security holes it won’t receive
patches for, ever.
Lack of visibility is in fact the main
precursor to security incidents.
Many of us don’t have IR capabilities.
They all immediately PANIC!
Organizations are still getting breached due to poor
key/credentials management, unpatched
applications and misconfigured services (eg. cloud
databases).
33
− It’s very hard to report vulnerabilities
− Often vendors do not have a Coordinated
Vulnerability Disclosure (CVD) policy
− FTC and/or ENISA recommendations for customers’
safety are not always followed
− Just few of the EU member states do have a CVD
framework in place at national level
− CEPS’ report on «Software Vulnerability Disclosure
in Europe» aims at helping member states with the
technology, the policies and legal challenges
ahead.
Reporting vulnerabilities
34
Mandatory Shodan slide
www.shodan.io
Our strategy
36
The “PANINI” Concept:
37
38
WHAT ARDUINO PROVIDES
Sensors Data +
Device Interaction
Automatic
Code Generation
Arduino Hardware
Secure
Cloud Connection
Device Management
OTA Updates
Firmware Changes
Business Logic
Firmware Upload
Certificate or Password
Provisioning
Dashboards Third Parties IoT SaaS
Arduino IoT Cloud
39
Security
Secure in every layer
Hardware
Software
Data
40
Core to the future and success of IoT is the “security of things”
Device
Identity
Anti-tampering
Key
Management
Encrypted
Transport and
Data
Confidentiality
41
SECURE ELEMENT
42
Hardware Security
ATECC508A/ATECC608A Cryptographic Co-Processor from Microchip Technology
What we use it for?
– Secure Hardware-Based Key Storage
up to 16 keys, certificates or data
– Hardware Support for Asymmetric Sign, Verify, Key Agreement
ECDSA, ECDH, NIST P256 Elliptic Curve Support
– Internal high-quality FIPS Random Number Generator (RNG)
43
Data encryption and secure authentication
– All traffic to/from Arduino IoT Cloud is encrypted using Transport Layer Security (TLS)
– Device authentication using X.509 certificates
– Initial support for JSON Web Tokens (ECDSA P-256 SHA-256) in ArduinoECCX08 library
– AES-128 (for LoRaWAN™), AES-CMAC for messages exchange, which includes encryption
and integrity.
THAT’S A WRAP,
THANK YOU!
Gianluca Varisco <g.varisco@arduino.cc>
@gvarisco

More Related Content

PPTX
IoT security
YashKesharwani2
 
PPTX
Iot Security, Internet of Things
Bryan Len
 
PPTX
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
PDF
Mbs t18 a
SelectedPresentations
 
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
PPTX
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP
 
IoT security
YashKesharwani2
 
Iot Security, Internet of Things
Bryan Len
 
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP
 

What's hot (20)

PPTX
IoT Security Awareness Training : Tonex Training
Bryan Len
 
PDF
Module 1 (legality)
Wail Hassan
 
PDF
Introduction (ethical hacking)
Wail Hassan
 
PDF
IoT/M2M Security
Yu-Hsin Hung
 
PPTX
S_IOT_Intro.pptx
rutika12345
 
PPTX
Internet of things security challenges
Hadi Fadlallah
 
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Manisha Luthra
 
PDF
Security Aspects in IoT - A Review
Asiri Hewage
 
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Seungjoo Kim
 
PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Yogesh Ojha
 
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
PDF
Loc jack presentation
QuestTechnologyIntl
 
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
 
PDF
Third Annual Mobile Threats Report
Juniper Networks
 
PDF
IoT Circuit Threats and Vulnerabilities
www.securekm.com; Secure Knowledge Management Inc.
 
PPTX
ASDF WSS 2014 Keynote Speech 1
Association of Scientists, Developers and Faculties
 
PPTX
Study on Zeus Banking Malware
Shaik Anisa
 
PDF
AVG Q3 2012 Threat Report
AVG Technologies AU
 
PDF
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Vladimir Eliseev
 
IoT Security Awareness Training : Tonex Training
Bryan Len
 
Module 1 (legality)
Wail Hassan
 
Introduction (ethical hacking)
Wail Hassan
 
IoT/M2M Security
Yu-Hsin Hung
 
S_IOT_Intro.pptx
rutika12345
 
Internet of things security challenges
Hadi Fadlallah
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Manisha Luthra
 
Security Aspects in IoT - A Review
Asiri Hewage
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Seungjoo Kim
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Yogesh Ojha
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Loc jack presentation
QuestTechnologyIntl
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
Andris Soroka
 
Third Annual Mobile Threats Report
Juniper Networks
 
IoT Circuit Threats and Vulnerabilities
www.securekm.com; Secure Knowledge Management Inc.
 
Study on Zeus Banking Malware
Shaik Anisa
 
AVG Q3 2012 Threat Report
AVG Technologies AU
 
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Vladimir Eliseev
 
Ad

Similar to #OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino (20)

PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
PPTX
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
defencerabbit Team
 
PPTX
IoT, Data Analytics and Big Data Security.pptx
fizarcse
 
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
 
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
PDF
assignment help experts
#essaywriting
 
PDF
sample assignment
#essaywriting
 
DOCX
IoT Design Principles
ardexateam
 
PPT
Security Requirements in IoT Architecture
Vrince Vimal
 
PPTX
Big data, Security, or Privacy in IoT: Choice is Yours
Dilum Bandara
 
PPTX
A Quick Guide On What Is IoT Security_.pptx
TurboAnchor
 
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 
PDF
IoT – Breaking Bad
NUS-ISS
 
DOCX
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
 
PDF
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
PDF
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
GrapesTech Solutions
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Why_IoT_Security_Matters_in_2025_and_Beyond.pptx
defencerabbit Team
 
IoT, Data Analytics and Big Data Security.pptx
fizarcse
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
assignment help experts
#essaywriting
 
sample assignment
#essaywriting
 
IoT Design Principles
ardexateam
 
Security Requirements in IoT Architecture
Vrince Vimal
 
Big data, Security, or Privacy in IoT: Choice is Yours
Dilum Bandara
 
A Quick Guide On What Is IoT Security_.pptx
TurboAnchor
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 
IoT – Breaking Bad
NUS-ISS
 
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
 
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
IoT Security and Privacy Concerns: Safeguarding Your Connected Devices
GrapesTech Solutions
 
Ad

More from Paris Open Source Summit (20)

PDF
#OSSPARIS19 : Control your Embedded Linux remotely by using WebSockets - Gian...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : A virtual machine approach for microcontroller programming : th...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
Paris Open Source Summit
 
PDF
#OSSPARIS19: Construire des applications IoT "secure-by-design" - Thomas Gaza...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : Detecter des anomalies de séries temporelles à la volée avec Wa...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : Supervision d'objets connectés industriels - Eric DOANE, Zabbix
Paris Open Source Summit
 
PDF
#OSSPARIS19: Introduction to scikit-learn - Olivier Grisel, Inria
Paris Open Source Summit
 
PPTX
#OSSPARIS19 - Fostering disruptive innovation in AI with JEDI - André Loesekr...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : Comment ONLYOFFICE aide à organiser les travaux de recherches ...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : MDPH : une solution collaborative open source pour l'instructio...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : Publier du code Open Source dans une banque : Mission impossibl...
Paris Open Source Summit
 
PDF
#OSSPARIS19 : Libre à vous ! Raconter les libertés informatiques à la radio -...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Le logiciel libre : un enjeu politique et social - Etienne Gonn...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Conflits d’intérêt & concurrence : la place de l’éditeur dans l...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Table ronde : souveraineté des données
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Comment financer un projet de logiciel libre - LUDOVIC DUBOST, ...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - BlueMind v4 : les dessous technologiques de 10 ans de travail p...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Tuto de première installation de VITAM, un système d'archivage ...
Paris Open Source Summit
 
PDF
#OSSPARIS19 - Cryptpad : la collaboration chiffrée - LUDOVIC DUBOST, CEO XWik...
Paris Open Source Summit
 
#OSSPARIS19 : Control your Embedded Linux remotely by using WebSockets - Gian...
Paris Open Source Summit
 
#OSSPARIS19 : A virtual machine approach for microcontroller programming : th...
Paris Open Source Summit
 
#OSSPARIS19 : RIOT: towards open source, secure DevOps on microcontroller-bas...
Paris Open Source Summit
 
#OSSPARIS19: Construire des applications IoT "secure-by-design" - Thomas Gaza...
Paris Open Source Summit
 
#OSSPARIS19 : Detecter des anomalies de séries temporelles à la volée avec Wa...
Paris Open Source Summit
 
#OSSPARIS19 : Supervision d'objets connectés industriels - Eric DOANE, Zabbix
Paris Open Source Summit
 
#OSSPARIS19: Introduction to scikit-learn - Olivier Grisel, Inria
Paris Open Source Summit
 
#OSSPARIS19 - Fostering disruptive innovation in AI with JEDI - André Loesekr...
Paris Open Source Summit
 
#OSSPARIS19 : Comment ONLYOFFICE aide à organiser les travaux de recherches ...
Paris Open Source Summit
 
#OSSPARIS19 : MDPH : une solution collaborative open source pour l'instructio...
Paris Open Source Summit
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
#OSSPARIS19 : Publier du code Open Source dans une banque : Mission impossibl...
Paris Open Source Summit
 
#OSSPARIS19 : Libre à vous ! Raconter les libertés informatiques à la radio -...
Paris Open Source Summit
 
#OSSPARIS19 - Le logiciel libre : un enjeu politique et social - Etienne Gonn...
Paris Open Source Summit
 
#OSSPARIS19 - Conflits d’intérêt & concurrence : la place de l’éditeur dans l...
Paris Open Source Summit
 
#OSSPARIS19 - Table ronde : souveraineté des données
Paris Open Source Summit
 
#OSSPARIS19 - Comment financer un projet de logiciel libre - LUDOVIC DUBOST, ...
Paris Open Source Summit
 
#OSSPARIS19 - BlueMind v4 : les dessous technologiques de 10 ans de travail p...
Paris Open Source Summit
 
#OSSPARIS19 - Tuto de première installation de VITAM, un système d'archivage ...
Paris Open Source Summit
 
#OSSPARIS19 - Cryptpad : la collaboration chiffrée - LUDOVIC DUBOST, CEO XWik...
Paris Open Source Summit
 

Recently uploaded (20)

PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
Presentation about variables and constant.pptx
safalsingh810
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PPTX
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Presentation about variables and constant.pptx
safalsingh810
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
Odoo Integration Services by Candidroot Solutions
CandidRoot Solutions Private Limited
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 

#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino

  • 1. Gianluca Varisco, CISO Arduino Paris Open Source Summit - 10/12/2019 The evolving (IoT) security landscape @gvarisco
  • 2. TODAY FORMERLY Who am I? @gvarisco
  • 3. Enabling anyone to innovate by making complex technologies simple to use.
  • 4. Developing secure and reliable IoT applications can be hard
  • 5. Hardware Nodes (Devices, Sensors) Constrained devices Require C/C++ firmware skills Effective Power Management depends on Firmware Gateways Remote connections, SSH Device management Radio / Networks Long range / Low Power Source: https://makezine.com/2017/06/27/state-boards-platforms-pro ducts-purposes-current-crop-microcontrollers-vies-attention/
  • 6. Cloud Software Many different languages, protocols, libraries, security standards, etc.
  • 7. Data & persistence Different data formats make data manipulation and interpretation difficult
  • 8. 8 The IoT Landscape is quite fragmented
  • 9. 9 The IoT “Line of Insanity”™
  • 10. We are drowning in technology. We are not becoming more secure.
  • 11. 11 − Not realizing to be potential targets − Treating cybersecurity as an IT problem − Thinking threats are only external rather than internal or accidental − Thinking the cloud provider is in charge of data/infra security (oh, and backups!) − Not using properly their e-mail infrastructure, especially if managed by 3rd parties We are wasting billions to “defend ourselves” from APTs. Buying Next-Gen appliances. Following predictions and hypes. Don't be scared to go back to basics with your cybersecurity strategy. Many of us are still making the same, old mistakes
  • 12. 12 − PERVASIVENESS: You won’t have one IoT device, you’ll have ten. − That’s a lot of new attack surface to your life and/or business − UNIQUENESS: IoT devices are a wild-west of mixed technologies. − How do I patch firmware on these dozen devices? − Which random vendor made the HW inside the device? So? What’s wrong in IoT?
  • 13. 13 − ECOSYSTEM: Your vendor may be leveraging six other vendors − Where’s your data going once it enters that IoT device? − Who has access to your network via proxy connections? So? What’s wrong in IoT?
  • 14. 14 Why does it matter?
  • 15. 15 IoT vs Web Stack
  • 16. 16 IoT attack surface identification Source: Security Innovation
  • 17. 17 IoT: assessing the risks Source: Security Innovation
  • 18. 18 − Insufficient Security training − Humans #1 weak point: building, deploying, using − Weak Physical Security − Debug interfaces (JTAG, UART, etc.) and USB ports allow unintended device or data access − Infrequent updates − Firmware, device apps, admin apps/interfaces − Expensive and/or remote IoT devices long lifespan (difficult to update) TOP 4 IoT Security Risks
  • 19. 19 − Weak Data Protection − Data at rest/transit uses weak encryption techniques − Lack of dedicated security chips and modules to store sensitive data. TOP 4 IoT Security Risks
  • 20. 20 − Privacy − PII leakage − Mass surveillance − Stalking − Theft − Data breaches − Liability − Reputation − Botnets, e.g. Mirai, for mass hacking End-user risks
  • 22. 22 − Vulnerabilities bypassing password protection: − Memory corruption issues (Buffer Overflow, Format String, etc.) − CSRF − Backdoor accounts − Lack of brute-force protection I am safe, I changed all my passwords
  • 23. 23 − Patches are often late by years − Many IoT devices do not get a patch, ever I am safe, I regularly patch all of my IoT devices
  • 24. 24 − If your IoT device has an Internet routable IPv4(/v6) address, without any firewall port filtering: − Just prepare for apocalypse − Seriously, don’t do that − CCTV is OCTV today Problems with direct IPv4(/v6) connection
  • 25. 25 The IoT device is only available in a closed network
  • 26. 26 The device is only exposed in my area (physically)
  • 27. 27 − NAT is sneaky evil − Users believe they are safe behind home router NAT − Developers created ways to connect devices behind NAT, seamless I am safe, home network, behind NAT
  • 28. 28 Think again: − UPNP − IPv6 − Teredo (encapsulates IPv6 packets within UDP/IPv4 datagrams) − Cloud I am safe, home network, behind NAT
  • 30. For the next 5-10 years, assume your IoT device has horrible security holes it won’t receive patches for, ever.
  • 31. Lack of visibility is in fact the main precursor to security incidents.
  • 32. Many of us don’t have IR capabilities. They all immediately PANIC! Organizations are still getting breached due to poor key/credentials management, unpatched applications and misconfigured services (eg. cloud databases).
  • 33. 33 − It’s very hard to report vulnerabilities − Often vendors do not have a Coordinated Vulnerability Disclosure (CVD) policy − FTC and/or ENISA recommendations for customers’ safety are not always followed − Just few of the EU member states do have a CVD framework in place at national level − CEPS’ report on «Software Vulnerability Disclosure in Europe» aims at helping member states with the technology, the policies and legal challenges ahead. Reporting vulnerabilities
  • 37. 37
  • 38. 38 WHAT ARDUINO PROVIDES Sensors Data + Device Interaction Automatic Code Generation Arduino Hardware Secure Cloud Connection Device Management OTA Updates Firmware Changes Business Logic Firmware Upload Certificate or Password Provisioning Dashboards Third Parties IoT SaaS Arduino IoT Cloud
  • 39. 39 Security Secure in every layer Hardware Software Data
  • 40. 40 Core to the future and success of IoT is the “security of things” Device Identity Anti-tampering Key Management Encrypted Transport and Data Confidentiality
  • 42. 42 Hardware Security ATECC508A/ATECC608A Cryptographic Co-Processor from Microchip Technology What we use it for? – Secure Hardware-Based Key Storage up to 16 keys, certificates or data – Hardware Support for Asymmetric Sign, Verify, Key Agreement ECDSA, ECDH, NIST P256 Elliptic Curve Support – Internal high-quality FIPS Random Number Generator (RNG)
  • 43. 43 Data encryption and secure authentication – All traffic to/from Arduino IoT Cloud is encrypted using Transport Layer Security (TLS) – Device authentication using X.509 certificates – Initial support for JSON Web Tokens (ECDSA P-256 SHA-256) in ArduinoECCX08 library – AES-128 (for LoRaWAN™), AES-CMAC for messages exchange, which includes encryption and integrity.
  • 44. THAT’S A WRAP, THANK YOU! Gianluca Varisco <[email protected]> @gvarisco