@incollection{PoddebniakDresenMuelleretal.2018, author = {Poddebniak, Damian and Dresen, Christian and M{\"u}ller, Jens and Ising, Fabian and Schinzel, Sebastian and Friedberg, Simon and Somorovsky, Juraj and Schwenk, J{\"o}rg}, title = {Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels}, series = {USENIX Security 2018}, booktitle = {USENIX Security 2018}, edition = {27th}, address = {Baltimore, MD, USA}, isbn = {978-1-931971-46-1}, year = {2018}, language = {en} } @inproceedings{DresenIsingPoddebniaketal.2020, author = {Dresen, Christian and Ising, Fabian and Poddebniak, Damian and Kappert, Tobias and Holz, Thorsten and Schinzel, Sebastian}, title = {CORSICA: Cross-Origin Web Service Identification}, series = {The 15th ACM ASIA Conference on Computer and Communications Security}, booktitle = {The 15th ACM ASIA Conference on Computer and Communications Security}, editor = {Zhou, Jianying}, year = {2020}, abstract = {Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74\%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.}, language = {en} } @article{GierlingSaatjohannDresenetal.2020, author = {Gierling, Markus and Saatjohann, Christoph and Dresen, Christian and K{\"o}be, Julia and Rath, Benjamin and Eckardt, Lars and Schinzel, Sebastian}, title = {Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients' Risk}, series = {86. Jahrestagung und Herztage 2020 der DGK}, volume = {Band 109, Supplement 1, April 2020}, journal = {86. Jahrestagung und Herztage 2020 der DGK}, doi = {10.1007/s00392-020-01621-0}, pages = {1 -- 2}, year = {2020}, abstract = {Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn't require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients' risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients' risk was rated by clinicians (security vulnerability of patients' data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients' risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients' risks from security vulnerabilities in implanted cardiac devices.}, language = {en} } @inproceedings{GierlingDresenEichetal.2018, author = {Gierling, Markus and Dresen, Christian and Eich, Hans and Mittman, Karin and Schinzel, Sebastian and Haverkamp, Uwe}, title = {Analysis and consequences of an imaging process concerning the cyber security of a networked computer tomography scanner}, series = {STRAHLENTHERAPIE UND ONKOLOGIE}, booktitle = {STRAHLENTHERAPIE UND ONKOLOGIE}, pages = {185 -- 186}, year = {2018}, language = {en} } @inproceedings{WillingDresenHaverkampetal.2020, author = {Willing, Markus and Dresen, Christian and Haverkamp, Uwe and Schinzel, Sebastian}, title = {Analyzing medical device connectivity and its effect on cyber security in german hospitals}, publisher = {BMC Medical Informatics and Decision Making volume}, doi = {10.1186/s12911-020-01259-y}, year = {2020}, abstract = {Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked. Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs. Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.}, language = {en} } @inproceedings{PuschnerSaatjohannWillingetal.2021, author = {Puschner, Endres and Saatjohann, Christoph and Willing, Markus and Dresen, Christian and K{\"o}be, Julia and Rath, Benjamin and Paar, Christof and Eckardt, Lars and Haverkamp, Uwe and Schinzel, Sebastian}, title = {Listen to Your Heart: Evaluation of the Cardiologic Ecosystem}, series = {ARES 2021: The 16th International Conference on Availability, Reliability and Security}, booktitle = {ARES 2021: The 16th International Conference on Availability, Reliability and Security}, doi = {10.1145/3465481.3465753}, url = {http://nbn-resolving.de/urn:nbn:de:hbz:836-opus-139012}, year = {2021}, abstract = {Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients' health. This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices. Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients' rights and companies' obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem.}, language = {en} } @article{BrinkmannDresenMergetetal.2021, author = {Brinkmann, Marcus and Dresen, Christian and Merget, Robert and Poddebniak, Damian and M{\"u}ller, Jens and Somorovsky, Juraj and Schwenk, J{\"o}rg and Schinzel, Sebastian}, title = {ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication}, series = {30th USENIX Security Symposium}, journal = {30th USENIX Security Symposium}, year = {2021}, language = {en} } @article{WillingDresenGerlitzetal.2021, author = {Willing, Markus and Dresen, Christian and Gerlitz, Eva and Haering, Maximilian and Smith, Matthew and Binnewies, Carmen and Guess, Tim and Haverkamp, Uwe and Schinzel, Sebastian}, title = {Behavioral responses to a cyber attack in a hospital environment}, series = {Nature -- Scientific Reports}, journal = {Nature -- Scientific Reports}, doi = {10.1038/s41598-021-98576-7}, year = {2021}, abstract = {Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors' incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40\% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.}, language = {en} }