Title: Hidden Functionalities in Electronic Devices and Computer Software
1Hidden Functionalitiesin Electronic Devices and
Computer Software
- Lt Pawel Koszut
- Ministry of National Defence (POLAND)?
2Hidden Functionalitiesin Electronic Devices and
Computer Software
- Simple backdoor implementation
3XOR Example
- function xor (int a,b)
- if (a?b) return 1 else return 0
-
4XOR Example
5XOR Example
6Prosty przyklad XOR
7XOR Example
8XOR Example
9XOR Example
- It is important to take notice of the following
- The length n of secret triggering sequence
secret_sequence can be long enough to
effectively prevent triggered_action() from being
called unintentionally - The triggering strategy presented above is only
an example - an adversary's creativity in
developing other triggering conditions is not
constrained by this example - Hidden functionalities may exist in multiple
locations of a device, and can be designed to
interact each other
10Applicationin Telecommunication Devices
11Przyklad urzadzen telekomunikacyjnych
12Threat analysis
13Threat Analysis
14Threat Analysis
15Threat Analysis
16Threat Analysis
17Threat Analysis
18Critical Security Vulnerabilities
19Critical Security Vulnerabilities
20Critical Security Vulnerabilities
- 365 days most computers have already been
- updated
- 1 day few computers have been updated, most
- of them remain vulnerable
- 0 day all computers are vulnerable
21Critical Security Vulnerabilities
22Critical Security Vulnerabilities
23Critical Security Vulnerabilities
24Critical Security Vulnerabilities
25Critical Security Vulnerabilities
- Where can we get 0-day vulnerbilities ?
26Critical Security Vulnerabilities
27Critical Security Vulnerabilities
- We sometimes pay for exploits. An average price
for a 0-day Internet Explorer flaw is US10,000
in case of good exploitation. - Zródlo
- http//www.securityfocus.com/news/11476
- Robert Lemos, SecurityFocus 2007-07-20
28Critical Security Vulnerabilities
29Critical Security Vulnerabilities
30Hidden Functionalitiesin Electronic Devices and
Computer Software
- Covered in the Analysis
- 1. Information on possible security threats and
ideas for law-enforcement applications - 2. Proposals of counter-measures strategies
31Hidden Functionalitiesin Electronic Devices and
Computer Software