SlideShare a Scribd company logo
SESSION ID:SESSION ID:
#RSAC
Dr Ralf Huuck
Stop Passing the Bug: IoT Supply Chain
Security
GPS-R03
Director & Senior Architect
Synopsys
#RSAC
IoT: Connected Clones
#RSAC
Hack One – Control ‘Em All
Each IoT Product million times the same.
One Breach = One Clone Army.
Billions of IoT devices in the near future.
#RSAC
IoT Army Attacks
#RSAC
MIRAI IoT Botnet
145,607 hacked IP cameras and DVRs.
Hardcoded PWD from supplied OEM components.
#RSAC
Truly Complex IoT Systems
#RSAC
Looking Inside Software Components
#RSAC
X-Ray Your Software: How Bad Is It?
#RSAC
Reference Vulnerability Source
National Vulnerability Database (NVD)
Common Vulnerabilities and Exposure (CVE) = vulnerability naming
Common Vulnerability Scoring System (CVSS) = severity
#RSAC
CVE Example
Currently: 86575 CVE entries
© 2016 Synopsys, Inc. 11
5,767
Total Software Scanned
2,041
Vulnerable Software
35.2%
49,478
Identified Third-Party
Components
13,098
Vulnerable Components
26.5%
A total of 5,767 pieces of software
were scanned. 35.22% contained
at least 1 vulnerable components
A total of 49,478 third-party
components were identified within
the scanned software. 26.47% of
the 3rd-party components
contained vulnerabilities
2014 Study Results
Products Components
© 2016 Synopsys, Inc. 12
Who is Affected?
ROUTER
4,269
CVEs affecting 70 Components
SMART TV
MULTIFUNCTION PRINTER
WI-FI ACCESS POINT
BABY MONITOR
CAR INFOTAINMENT
THERMOSTAT
INFUSION PUMP
SMART PHONE
SECURITY CAMERA
407
CVEs affecting 6 Components
9
CVEs affecting 18 Components
724
CVEs affecting 18 Components
909
CVEs affecting 44 Components
888
CVEs affecting 26 Components
858
CVEs affecting 17 Components
1,174
CVEs affecting 17 Components
54
CVEs affecting 1 Components
226
CVEs affecting 3 Components
#RSAC
Rinse, Repeat: 2017 Open Source
#RSAC
2017 Overview
#RSAC
Who: Top Observed Components
Q: Why Linux kernel so frequent?
A: Unclear. Anonymized data.
zlib
linux
openssl
libpng
busybox
Top 20 Components
Most common types:
1. utilities
2. protocols
3. media
#RSAC
How Often: Distribution of All CVEs
Frequency of all CVEs Observed
Heartbleed (CVE 2014-0160)
still in top 50%
#RSAC
How old? CVEs by Age
dates back to 1999!
CVE Entries by Year
45% from
2013 or older
2016
2015
2014
2013
#RSAC
Impact: Distribution By Severity (CVSS)
58 3
#RSAC
Versions: Wrong Choices
Mostly
“broken”
version
used
#RSAC
How did the Celebrities Fare?
#RSAC
2017 Most Common Causes
Most Common CWE: #119
Improper restrictions of Operations
within Memory Buffer.
Second: #20: Improper Input Validation
#RSAC
Securing IoT Software
#RSAC
Your IoT Device
#RSAC
Your IoT Device
#RSAC
Your IoT Device
#RSAC
Your IoT Supply Chain
#RSAC
Securing IoT Supply Chain
#RSAC
Securing IoT Supply Chain
#RSAC
Your Approved IoT Device
#RSAC
3 Core Steps
1. Secure Each Component
2. Trust but Verify Composition
3. Independent Validation
#RSAC
Step 1: Secure Each Component
#RSAC
Step 1: Secure Each Component
IoT Security Ideal
inexpensive
minimal expertise
quick to achieve
#RSAC
Automatic Tools to the Rescue
Static Analysis
Runtime Monitors
Penetration Testing
#RSAC
Static Analysis: Automatic Code Inspection
XSS, Injections, CSRF,
Security vulnerabilities
Memory violations,
Logic errors, Defects
Race conditions,
Memory corruption,
Concurrency errors, Deadlocks
#RSAC
Example: Fix While Coding
#RSAC
Pen Testing: Automatic Application Fuzzing
dangerous data
#RSAC
Example: Pen Testing APIs and Protocols
Protocols Hardening
Software systems and components communicate
Hack Yourself First
Finding unknown, exploitable vulnerabilities
Proactive Fixes
Patch holes before exploitation
#RSAC
Runtime Monitoring: Augment Your Applications
exercise common
attack vectors
observe failures
and record causes
#RSAC
Step 2: Secure Integration /
Composition
#RSAC
Step 2: Secure Integration / Composition
IoT Security Ideal
inexpensive
minimal expertise
quick to achieve
#RSAC
Composition Analysis: Product In, Report Out
#RSAC
Step 3: Independent Validation
#RSAC
Step 3: Independent Validation
#RSAC
Step 3: Independent Validation
Standards Insurance Certification
#RSAC
Example: UL 2900 Cybersecurity Assurance
Program
Assessment with time-bounded certification horizon.
#RSAC
Lessons Learnt
#RSAC
Software is Broken
#RSAC
No Single Bullet IoT Security Solution
48
#RSAC
Use (Automated) Tools
Everything else does not scale.
Don’t drive yourself crazy.
#RSAC
Apply to Your Supply Chain
50
Next week:
draw a map of 1st party and 3rd party components in your (sub)product
“grep” for all licenses in your (sub)project
In the first three months:
look up CVE information of your 3rd party components in the NVD
make a plan how to monitor CVE status for your 3rd party components
Within six months:
use FOSSology or similar to automate license discovery
establish an automated CVE monitoring approach
#RSAC
Thank You!
ralf.huuck@synopsys.com
@ no twitter
#D2 with M.Tech

More Related Content

What's hot (20)

PPTX
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
 
PDF
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
Praetorian
 
PDF
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Praetorian
 
PDF
Advanced red teaming all your badges are belong to us
Priyanka Aash
 
ODP
Sguil
Michael Boman
 
PDF
Attacks on Critical Infrastructure: Insights from the “Big Board”
Priyanka Aash
 
PDF
Greater China Cyber Threat Landscape - ISC 2016
Sergey Gordeychik
 
PPTX
Scada security presentation by Stephen Miller
AVEVA
 
PPTX
A look at current cyberattacks in Ukraine
Kaspersky
 
PDF
Brosur AKCP sensor Probe4
PT. Siwali Swantika
 
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
Chris Sistrunk
 
PDF
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Lancope, Inc.
 
PPT
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Praetorian
 
PDF
Smart Megalopolises. How Safe and Reliable Is Your Data?
Priyanka Aash
 
PPTX
Vulnerability Inheritance in ICS (English)
Digital Bond
 
PDF
Compromising Industrial Facilities From 40 Miles Away
EnergySec
 
PDF
Come See What’s Cooking in My Lab
EnergySec
 
PPTX
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Dragos, Inc.
 
PDF
Realities of Data Security
Priyanka Aash
 
PPT
DHS ICS Security Presentation
guest85a34f
 
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
 
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
Praetorian
 
Exploring Risk and Mapping the Internet of Things with Autonomous Drones
Praetorian
 
Advanced red teaming all your badges are belong to us
Priyanka Aash
 
Attacks on Critical Infrastructure: Insights from the “Big Board”
Priyanka Aash
 
Greater China Cyber Threat Landscape - ISC 2016
Sergey Gordeychik
 
Scada security presentation by Stephen Miller
AVEVA
 
A look at current cyberattacks in Ukraine
Kaspersky
 
Brosur AKCP sensor Probe4
PT. Siwali Swantika
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Chris Sistrunk
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Lancope, Inc.
 
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Praetorian
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Priyanka Aash
 
Vulnerability Inheritance in ICS (English)
Digital Bond
 
Compromising Industrial Facilities From 40 Miles Away
EnergySec
 
Come See What’s Cooking in My Lab
EnergySec
 
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Dragos, Inc.
 
Realities of Data Security
Priyanka Aash
 
DHS ICS Security Presentation
guest85a34f
 

Viewers also liked (20)

PPTX
Axestrack - Tarck Mobile App
Shalini Madan
 
PPTX
AxesTrack - GPS for FREE
AXESTRACK SOFTWARE SOLUTIONS
 
PDF
Supply chain using big data, IoT and Sage X3
Abubakr Asif
 
PPTX
IoT applications for supply chain
Andrej Planina
 
PPTX
Some conceptual views on iot in the supply chain
Stefan Harrstedt
 
PDF
IoT Technologies and the Changes in Manufacturing and Logistics
CESAR
 
PPTX
Iot ppt
madhukeerthana6
 
PDF
logistics and the internet of things
Sergey Zhdanov
 
PPTX
Logistics IT Solutions Turn Smarter with IoT Driven Mobility
SPEC INDIA
 
PPTX
Realizing Business and Supply Chain Value with Internet of Things (iot)
GS1 Hong Kong
 
PPTX
Digital transformation in general terms, a few oneliners
Stefan Harrstedt
 
PDF
Presentation at the October Scope Event on Internet of Things
Lora Cecere
 
PPTX
Leveraging IoT for Product Visibility across the Supply Chain
Capgemini
 
PPTX
IoT For Logistics
DreamOrbit Softech Pvt Ltd.
 
PDF
Future of logistics
Justino Lourenço
 
PPT
IOT in Logistics Market Worth US$ 10 Billion by 2022
danishsmith01
 
PDF
What impact will the Internet of Things have on supply chain? A discussion - ...
Global Business Intelligence
 
PPTX
IoT and the Supply Chain
Sotiris Koussouris
 
PPT
Internet of Things and its applications
Pasquale Puzio
 
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Axestrack - Tarck Mobile App
Shalini Madan
 
AxesTrack - GPS for FREE
AXESTRACK SOFTWARE SOLUTIONS
 
Supply chain using big data, IoT and Sage X3
Abubakr Asif
 
IoT applications for supply chain
Andrej Planina
 
Some conceptual views on iot in the supply chain
Stefan Harrstedt
 
IoT Technologies and the Changes in Manufacturing and Logistics
CESAR
 
logistics and the internet of things
Sergey Zhdanov
 
Logistics IT Solutions Turn Smarter with IoT Driven Mobility
SPEC INDIA
 
Realizing Business and Supply Chain Value with Internet of Things (iot)
GS1 Hong Kong
 
Digital transformation in general terms, a few oneliners
Stefan Harrstedt
 
Presentation at the October Scope Event on Internet of Things
Lora Cecere
 
Leveraging IoT for Product Visibility across the Supply Chain
Capgemini
 
IoT For Logistics
DreamOrbit Softech Pvt Ltd.
 
Future of logistics
Justino Lourenço
 
IOT in Logistics Market Worth US$ 10 Billion by 2022
danishsmith01
 
What impact will the Internet of Things have on supply chain? A discussion - ...
Global Business Intelligence
 
IoT and the Supply Chain
Sotiris Koussouris
 
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Ad

Similar to Stop Passing the Bug: IoT Supply Chain Security (20)

PDF
How to Analyze an Android Bot
Priyanka Aash
 
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
PDF
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
PDF
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Jonathan Cran
 
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Priyanka Aash
 
PDF
RSAC 2016: How to Get into ICS Security
Chris Sistrunk
 
PDF
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
 
PPTX
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
lior mazor
 
PDF
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Priyanka Aash
 
PPTX
Fle f04 mishra-v0.9
Minatee Mishra
 
PPTX
RSA USA 2015 - Getting a Jump on Hackers
Wolfgang Kandek
 
PDF
Making Threat Intelligence Actionable Final
Priyanka Aash
 
PDF
Efficacy Of Layered Application Security Through The Lens Of Hacker
Priyanka Aash
 
PDF
RSA ASIA 2014 - Internet of Things
Wolfgang Kandek
 
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
PDF
"Building Security Protections for Robotic Devices", Anastasiia Voitova
Fwdays
 
PDF
Transforming Security: Containers, Virtualization and Softwarization
Priyanka Aash
 
PDF
Advances in cloud scale machine learning for cyber-defense
Priyanka Aash
 
How to Analyze an Android Bot
Priyanka Aash
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Priyanka Aash
 
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
Embedded Systems Security: Building a More Secure Device
Priyanka Aash
 
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Jonathan Cran
 
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Priyanka Aash
 
RSAC 2016: How to Get into ICS Security
Chris Sistrunk
 
Cyber Crime / Cyber Secuity Testing Architecture by MRITYUNJAYA HIKKALGUTTI (...
MrityunjayaHikkalgut1
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
lior mazor
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Priyanka Aash
 
Fle f04 mishra-v0.9
Minatee Mishra
 
RSA USA 2015 - Getting a Jump on Hackers
Wolfgang Kandek
 
Making Threat Intelligence Actionable Final
Priyanka Aash
 
Efficacy Of Layered Application Security Through The Lens Of Hacker
Priyanka Aash
 
RSA ASIA 2014 - Internet of Things
Wolfgang Kandek
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Priyanka Aash
 
"Building Security Protections for Robotic Devices", Anastasiia Voitova
Fwdays
 
Transforming Security: Containers, Virtualization and Softwarization
Priyanka Aash
 
Advances in cloud scale machine learning for cyber-defense
Priyanka Aash
 
Ad

More from Synopsys Software Integrity Group (20)

PDF
Webinar–Segen oder Fluch?
Synopsys Software Integrity Group
 
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
PDF
Webinar–The 2019 Open Source Year in Review
Synopsys Software Integrity Group
 
PDF
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
PDF
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys Software Integrity Group
 
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
Synopsys Software Integrity Group
 
PDF
Webinar–The State of Open Source in M&A Transactions
Synopsys Software Integrity Group
 
PDF
Webinar–5 ways to risk rank your vulnerabilities
Synopsys Software Integrity Group
 
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Synopsys Software Integrity Group
 
PDF
Webinar–Using Evidence-Based Security
Synopsys Software Integrity Group
 
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
Synopsys Software Integrity Group
 
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Synopsys Software Integrity Group
 
PDF
Webinar–What You Need To Know About Open Source Licensing
Synopsys Software Integrity Group
 
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Synopsys Software Integrity Group
 
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
 
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Synopsys Software Integrity Group
 
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Synopsys Software Integrity Group
 
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 
Webinar–Segen oder Fluch?
Synopsys Software Integrity Group
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Synopsys Software Integrity Group
 
Webinar–The 2019 Open Source Year in Review
Synopsys Software Integrity Group
 
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Synopsys Software Integrity Group
 
Webinar–OWASP Top 10 for JavaScript for Developers
Synopsys Software Integrity Group
 
Webinar–The State of Open Source in M&A Transactions
Synopsys Software Integrity Group
 
Webinar–5 ways to risk rank your vulnerabilities
Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Synopsys Software Integrity Group
 
Webinar–Using Evidence-Based Security
Synopsys Software Integrity Group
 
Webinar–Delivering a Next Generation Vulnerability Feed
Synopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Synopsys Software Integrity Group
 
Webinar–What You Need To Know About Open Source Licensing
Synopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Synopsys Software Integrity Group
 
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Synopsys Software Integrity Group
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Synopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Synopsys Software Integrity Group
 

Recently uploaded (20)

PDF
Code and No-Code Journeys: The Maintenance Shortcut
Applitools
 
PPTX
From spreadsheets and delays to real-time control
SatishKumar2651
 
PDF
Latest Capcut Pro 5.9.0 Crack Version For PC {Fully 2025
utfefguu
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PPTX
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
PDF
intro_to_cpp_namespace_robotics_corner.pdf
MohamedSaied877003
 
PDF
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
PDF
Best Web development company in india 2025
Greenusys
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
PDF
Ready Layer One: Intro to the Model Context Protocol
mmckenna1
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PPTX
MiniTool Partition Wizard Crack 12.8 + Serial Key Download Latest [2025]
filmoracrack9001
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PDF
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
PPTX
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
Introduction to Apache Iceberg™ & Tableflow
Alluxio, Inc.
 
PPTX
BB FlashBack Pro 5.61.0.4843 With Crack Free Download
cracked shares
 
Code and No-Code Journeys: The Maintenance Shortcut
Applitools
 
From spreadsheets and delays to real-time control
SatishKumar2651
 
Latest Capcut Pro 5.9.0 Crack Version For PC {Fully 2025
utfefguu
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
intro_to_cpp_namespace_robotics_corner.pdf
MohamedSaied877003
 
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
Best Web development company in india 2025
Greenusys
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
Ready Layer One: Intro to the Model Context Protocol
mmckenna1
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
MiniTool Partition Wizard Crack 12.8 + Serial Key Download Latest [2025]
filmoracrack9001
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
Introduction to Apache Iceberg™ & Tableflow
Alluxio, Inc.
 
BB FlashBack Pro 5.61.0.4843 With Crack Free Download
cracked shares
 

Stop Passing the Bug: IoT Supply Chain Security