Impact case study database
Search and filter
Filter by
- University of Oxford
- 11 - Computer Science and Informatics
- Submitting institution
- University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Summary impact type
- Technological
- Is this case study continued from a case study submitted in 2014?
- No
1. Summary of the impact
Research led by Horrocks, Motik, and Cuenca Grau in the Oxford Knowledge Representation and Reasoning group has had a wide-ranging impact on the development and deployment of semantic technologies over the last decade. They played a leading role in developing the revised and extended World Wide Web Consortium (W3C) standard Web Ontology Language, OWL 2, and have developed state-of-the-art reasoning systems that support this language. These represent important advances in exploiting the potential of semantic technologies for complex data and knowledge applications, and the work has led to diverse impacts across both industry and public service settings within the period. Open source reasoning tools developed in the group are enabling applications of OWL ontologies in areas as diverse as global healthcare IT (in the SNOMED clinical terminology) and large-scale infrastructure design (at the Norwegian multinational Aibel). The researchers have also developed RDFox, a high-performance knowledge graph and semantic reasoning engine that has created direct economic impact through the spinout company Oxford Semantic Technologies (OST). OST is backed by Samsung Ventures, with customers including Samsung and Festo, a German multinational industrial control and automation company.
2. Underpinning research
The OWL 2 ontology language and the Resource Description Framework (RDF) form part of the W3C’s Semantic Web stack. These standardised formats have been key enablers for tool development and the deployment of semantic technologies across a wide range of domains and applications. At Oxford, Cuenca Grau, Horrocks, and Motik have developed novel algorithms and pioneered state-of-the-art reasoning systems that support these standards, and developed technology for reasoning over RDF data and OWL ontologies that efficiently exploits the greater flexibility afforded by knowledge graphs over traditional database systems.
Reasoning systems are crucial for the application of ontology-based systems, underpinning both ontology development and ontology-based data access. HermiT is currently the only reasoner that fully supports the OWL 2 standard. It supports all of the datatypes specified in the standard, and correctly reasons about properties (binary predicates) as well as about classes (unary predicates). Building on initial work done at Manchester, Horrocks and Motik developed the system at Oxford from 2007, supported by the EPSRC standard grant “HermiT” (2008–12). HermiT uses a novel hypertableau algorithm that generalises so-called absorption optimisations and provides greatly improved efficiency [ R1]. The system also employs a wide range of novel optimisation techniques, in particular techniques for reducing the size of the constructed models, and supports several extensions that go beyond the OWL standard [ R2, with international collaborators].
ELK is a consequence-based reasoner developed at Oxford. ELK uses novel algorithms that extend the range of consequence-based reasoning to include more expressive ontology languages that go beyond the OWL 2 EL profile, a standardised subset of OWL that enjoys polynomial time worst-case complexity for many reasoning tasks. A key feature of these algorithms is that, although the language that they support is not worst-case polynomial, they remain optimal for subsets that do enjoy this property, as proven via parameterised complexity analysis [ R3]. ELK also employs novel parallelisation techniques to improve efficiency on modern multi-processor architectures.
RDF is a standard model for data exchange on the internet and a key tool for semantic technologies. It extends the linking structure of the Web to use Universal Resource Identifiers (URIs) to name the relationship between things as well as the two ends of the link (a “triple”). This simple model allows structured and semi-structured data to be mixed, exposed, and shared across different applications. The main focus of HermiT and ELK is ontology reasoning: they do support basic reasoning with RDF data, but not conjunctive queries (the basis for the W3C standard query language SPARQL), or scalability to large datasets. RDFox is a highly optimised RDF-triple store developed at Oxford by Motik, Nenov, Piro, and Horrocks. RDFox uses a novel main memory architecture and parallelisation techniques to support storage and efficient query answering over billions of triples [ R4]. Query answering takes into account not only the RDF data, but also an ontology expressed using the OWL 2 RL profile, which can be seen as a fragment of Datalog. In order to make this efficient, RDFox pre-materialises relevant entailments, and employs novel incremental materialisation algorithms to avoid costly recomputation when the underlying RDF data changes [ R5]. This is particularly difficult when combined with reasoning about equality, which is required in order to support the OWL and SPARQL standards [ R6].
3. References to the research
[ R1] B. Motik, R. Shearer, I. Horrocks: Hypertableau Reasoning for Description Logics. J. Artif. Intell. Res., 2009: https://doi.org/10.1613/jair.2811. Submitted to REF 2014.
[ R2] B. Glimm, I. Horrocks, B. Motik, G. Stoilos, Z. Wang: HermiT: An OWL 2 Reasoner. J. Autom. Reasoning, 2014: https://doi.org/10.1007/s10817-014-9305-1. Submitted to REF 2021.
[ R3] F. Simancik, B. Motik, I. Horrocks: Consequence-based and fixed-parameter tractable reasoning in description logics. Artif. Intell., 2014: https://doi.org/10.1016/j.artint.2014.01.002. Submitted to REF 2021.
[ R4] B. Motik, Y. Nenov, R. Piro, I. Horrocks, D. Olteanu: Parallel Materialisation of Datalog Programs in Centralised, Main-Memory RDF Systems. Proc. of the 28th Nat. Conf. on Artif. Intell. (AAAI), 2014: https://ojs.aaai.org/index.php/AAAI/article/view/8730.
[ R5] B. Motik, Y. Nenov, R. Piro, I. Horrocks: Maintenance of datalog materialisations revisited. Artif. Intell., 2019: https://doi.org/10.1016/j.artint.2018.12.004. Submitted to REF 2021.
[ R6] B. Motik, Y. Nenov, R. Piro, I. Horrocks: Combining Rewriting and Incremental Materialisation Maintenance for Datalog Programs with Equality. Proc. of the 24th Int. Joint Conf. on Artif. Intell. (IJCAI), 2015: http://ijcai.org/Abstract/15/441.
Grants. The research was supported by a series of EPSRC grants awarded to Horrocks, Motik, and Cuenca Grau between 2008 and 2021 and totalling around GBP4,300,000 (HermiT, EP/F065841/1; ConDOR, EP/G02085X/1; DBOnto, EP/L012138/1; ED3, EP/N014359/1; MaSI3, EP/K00607X/1; AnaLOG, EP/P025943/1).
4. Details of the impact
Our work on reasoning infrastructure for ontologies and knowledge graphs has led to a range of impacts in diverse settings. These include:
impact on ontology developers, through the development of technical standards and open source tools that support these standards;
impact on non-profit organisations and businesses that develop and use ontology-based systems;
direct impacts on commerce and production through the spinout company OST and the application of its patented technology in industry.
Impact on ontology development through open source reasoners for OWL 2 ontologies.
Horrocks, Motik, and Cuenca Grau have been influential in the development of the OWL ontology language, editing key specification documents for the refined and extended OWL 2 standard (second edition published by W3C in 2012) [ E1]. The standard allows ontologies to be shared across applications, and has stimulated increasing use of ontologies in a range of sectors. Reasoning systems that support OWL, in turn, are an important enabling factor for the wider adoption of the standard and the increased uptake of ontology-based systems. Effective reasoners are critical for ontology development and use, for example to verify the consistency of the knowledge they express, to make implicit knowledge explicit, or to access data via queries. The OWL reasoners HermiT [ R1– 2] and ELK [ R3] have achieved wide reach as open source projects and through distribution with the open source Protégé OWL ontology editor, in which HermiT – the only reasoner that fully and correctly supports OWL [ R2] – is the standard reasoner. Protégé is the most popular tool for ontology design, with over 360,000 registered users, and is widely relied on for building and maintaining ontologies in industry and in large government projects such as the National Cancer Institute Thesaurus and the WHO’s International Classification of Diseases [ E2].
Large clinical and biomedical nomenclatures like these are a prominent application area for ontologies; they are gradually superseding existing medical classifications, and will provide the future platforms for gathering and sharing medical knowledge. One such ontology is SNOMED CT, the world’s most comprehensive clinical terminology – “a codified vocabulary that is now accepted as a common global language for health terms” [ E3]. It is owned and administered by the non-profit organisation SNOMED International, and is officially used in over 80 countries (including the UK, a founding charter member) to support the direct management of individual health and care and to improve the flow of data across health and care systems. SNOMED CT is an NHS Digital information standard, applying to all organisations providing NHS, Public Health, and/or Adult Social Care services. Since 2018 it has been implemented across Primary Care settings within the NHS, and is a core component of the NHS patient record service; all secondary, dentistry, and optometry services are required to establish a detailed implementation schedule by 31 December 2020 [ E3, E4].
SNOMED International has used ELK since 2016 to perform complex reasoning tasks in its new authoring platform: “for example, to check the logical consistency of (the definitions of) SNOMED concepts, and to automatically organise concepts into a hierarchical structure, which is essential when dealing with such a large terminology” [ E3]. SNOMED CT contains more than 400,000 terms and is “under constant revision and extension”. “ELK was a game changer for us as it reduced the time needed to reason with SNOMED CT from hours/days to only a few seconds. Not only that but, unlike some earlier systems, ELK was developed by researchers who were also able to provide formal and peer-reviewed guarantees as to the correctness of the algorithms embodied in ELK [ R3]. This is clearly of great value given the critical role played by SNOMED CT in the NHS and many other national healthcare systems” [CIO, SNOMED International: E3].
B2i Healthcare is a software engineering firm that specialises in SNOMED CT and healthcare information standards and exchange. B2i has used ELK across the whole assessment period to provide reasoning services in its authoring platform, Snow Owl. Snow Owl is deployed in over 3,000 locations in over 80 countries, and B2i is able to state that “ELK is the de facto global standard for classifying SNOMED CT ontologies by national eHealth programs and organizations”. These include national health ministries and agencies in the UK, Belgium, Denmark, Estonia, Ireland, Norway, Sweden, Switzerland, Australia, Singapore, New Zealand, and the USA [Non-Executive Chairman, B2i Healthcare: E5]. B2i uses ELK because of “its outstanding performance and the correctness guarantees provided by its basis in world leading research [ R3]. ELK performs description logic classification in parallel on modern multi-core computers, which allows the full international SNOMED CT plus the Australian extensions (830,926 relationships) to be classified and checked for equivalencies in about 10 seconds on a modern desktop computer. This is in stark contrast to earlier systems which took hours to perform this task, if they were capable of performing it at all. The orders of magnitude performance improvement provided by ELK means that reasoning can be used ‘on the fly’ during the authoring process, resulting in both improved quality and productivity” [ E5].
Besides medical and life sciences, OWL ontologies are increasingly used in industry to address information integration and access problems. Aibel is a multinational company headquartered in Norway that provides engineering and construction services in the oil, gas, and offshore wind industries. Aibel has used HermiT across the whole assessment period to (i) support the development of a new master ontology system for design requirements and specifications; and (ii) perform reasoning and query answering over this custom-built ontology to configure design and product selection. These tasks are now “performed with greater precision and less effort than with Aibel’s legacy system, ultimately resulting in a design of higher quality, which again reduces the total time and cost of construction” [Senior Manager: E6]. Aibel uses HermiT because of “its full support for the OWL ontology language, and its superior performance, reliability and scalability” in ontology reasoning [ E6; see R1– R2]. Using HermiT, Aibel has been able to document significant reductions in data errors and duplications. In the context of the very large projects delivered by the company, such deficiencies in data quality can have significant cost implications: for example, the presence of duplicate design artefacts leads to erroneous bulk orders of materials. The knowledge-based approach enabled by HermiT supports “a more efficient and precise description of design artefacts…removing practically all duplicate design artefacts recorded in the system. (It is estimated that more than 30% of the legacy system’s data was duplicate data.) The lack of duplicates and added detail in design descriptions make it easier to manage material storage and order a better selection of materials…The effect is an estimated cost reduction of approximately 5% for bulk material orders, which in large projects amounts to more than EUR100,000,000” [ E6]. Aibel states that: “in summary, HermiT plays an important role at Aibel, and has enabled us to deploy knowledge-based solutions that significantly reduce cost” [ E6].
Impact in industry through commercialisation of high-performance RDFox system.
Pathway to impact. The highly scalable RDFox tool was initially released for research purposes in 2014 under an open source licence. A patent was also filed on the underpinning research: this would later be significant to the commercialisation of the technology through the spinout company OST [ E7]. The Oxford team subsequently worked with industrial partners to develop the technology into a mature platform with performance bottlenecks identified and removed [ R5, R6]. RDFox was applied in several pilot industry projects, including with Siemens, for ontology-based data access enhancement (2015); Statoil (now Equinor), for integration and analysis of oil production and geological survey data (2016); Kaiser Permanente, in patient data analysis for healthcare compliance (2016); EDF Energy, to manage and analyse information about their electricity distribution network (2016); and other partners including Skyscanner, for recommender engines, and Armasuisse for text analysis [ E8]. During these pilot projects the functionality of RDFox was extended to match business requirements.
In 2017, OST was formed to bring cutting-edge research in semantic technologies to industry. OST has raised GBP4,100,000 in investment, including GBP3,000,000 in Series A investment led by Samsung Ventures, announced in June 2019 [ E9]. By September 2019 OST employed 6 full-time staff; 9 FTEs were employed by the end of the assessment period. OST’s patented technology is sold under licence to customers for a fee of approximately GBP50,000 per licence. Since April 2018, the company has secured licence sales worth over GBP570,000 [ E10]. Customers include Festo, a German multinational production line equipment company, and electronics giant Samsung.
Festo produce and sell pneumatic and electrical control and drive technology for factory or process automation. They have used RDFox since 2018 to implement a new semantic approach to data processing through the Festo Semantic Platform [ E11, E12.2]. In turn, the semantic approach has allowed them to optimise their sales process. Festo’s “choice of RDFox was based on its outstanding performance, reliability and scalability” compared to other knowledge graph systems, and its basis “in published algorithms whose correctness has been formally verified”, giving “high confidence that RDFox will continue to provide correct answers regardless of the knowledge and the queries that we use” [Head of Smart Data Services: E11]. RDFox’s performance advantages have a direct impact on production at Festo. The company’s product catalogue includes thousands of components that can be combined in millions of different configurations, with configurations being subject to many complex constraints. RDFox is used to compute possible configurations and to ensure their validity. The previous approach, using multiple relational databases, “took several hours to compute valid configurations, and also required complex data maintenance and deployment management. In contrast, RDFox can compute valid configurations in a few seconds…This saves us a huge amount of time and also allows for much greater flexibility in updating our product catalogue” [ E11]. The company has found that “the semantic approach is also much easier to maintain and extend” [ E11]. Queries are now “much easier to write”, and “extensions or changes in the information model due to technical or business demands are much faster accomplished and validated. That is a significant increase in flexibility as well as saving time and computing resources” [ E12.1]. As a result, Festo are extending the Semantic Platform to cover further technical product domains. As “a key component of the Festo Semantic Platform”, RDFox is central to this new approach across the company, “and as such is already having a significant impact on our data management business” [ E11; see also E12.2].
Prior to their investment in OST, Samsung had already funded various projects, worth approximately GBP500,000, with a view to using RDFox in several different customer-facing applications. Samsung are now using the RDFox knowledge graph system “to drive applications running on a variety of platforms including embedded systems and mobile devices (phones and tablets)”; these include, for example, lifestyle recommender systems linking very large and heterogeneous data sets covering areas such as food, health, and exercise. “When fully deployed, [Samsung] expect such applications to be running on millions of devices, all of which will access relevant knowledge via RDFox” [ E13]. Samsung’s choice of RDFox “was based on its outstanding performance, reliability and scalability.” Other knowledge graph systems tested by Samsung “were all found to be much slower than RDFox, often by orders of magnitude, and could also produce incorrect answers…In summary, RDFox is a key component of our knowledge-intensive applications, and we expect such applications to be used by hundreds of millions of Samsung customers worldwide” [ E13].
5. Sources to corroborate the impact
[ E1] OWL 2 Web Ontology Language. Document Overview (2nd edition; editor details at foot of the document): https://www.w3.org/TR/2012/REC-owl2-overview-20121211/. OWL Working Group (closed 2012): https://www.w3.org/2007/OWL/wiki/OWL_Working_Group.
[ E2] Protégé open source ontology editor ( https://protege.stanford.edu/): (1) user numbers; (2) documentation, showing Hermit is built-in reasoner; (3) use in NCI Thesaurus and WHO ICD.
[ E3] Letter of Aug. 2020 from CIO, SNOMED International, on the impact of ELK.
[ E4] SNOMED CT in the NHS. Overview: https://tinyurl.com/yy7g4ttz; NHS information standard SCCI0034 (SNOMED CT): https://tinyurl.com/sgj635y.
[ E5] Letter of Aug. 2020 from Non-Executive Chairman, B2i Healthcare, on the impact of ELK.
[ E6] Letter of Oct. 2020 from Senior Manager, Aibel, on the impact of HermiT.
[ E7] US patent US 20160259796 A1 (filed Oct 2014, granted Oct 2020): http://tiny.cc/xf11tz.
[ E8] Papers reporting technology-evaluation projects with industry partners (DOI/URL): Siemens – 10.1007/978-3-319-11964-9_38; 10.1145/2933267.2933290; Equinor – 10.1007/978-3-319-25010-6_6; Kaiser Permanente – 10.1007/978-3-319-46547-0_34; EDF Energy – http://tiny.cc/3kn0tz.
[ E9] Samsung investment in OST: https://innovation.ox.ac.uk/news/samsung-invests-ost/.
[ E10] Letter of Jan. 2020 from CEO at OST, corroborating information about the company.
[ E11] Letter of Sep. 2020 from Head of Smart Data Services, Festo, on the impact of RDFox.
[ E12] Industry papers on RDFox at Festo. (1) Paper by Festo on their application of RDFox in factory automation: https://iswc2017.semanticweb.org/paper-462/; (2) Paper by Festo on RDFox and the Festo Semantic Platform: https://doi.org/10.1007/978-3-030-32327-1_9.
[ E13] Letter of Aug. 2020 from Head of Bigdata Team, Samsung Research, on use of RDFox.
- Submitting institution
- University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Summary impact type
- Technological
- Is this case study continued from a case study submitted in 2014?
- No
1. Summary of the impact
Our application of system security analysis to widely deployed avionic systems has revealed a range of security and privacy challenges in technologies on which modern aviation relies. Our work has discovered practical cyber-attacks on modern surveillance systems and systematic leakage of sensitive data by privacy-sensitive aircraft operators. These insights have formed the basis for policy changes by air traffic regulators including the International Civil Aviation Organization, operational improvements by carriers, and new product developments by equipment manufacturers operating worldwide. We have also contributed to the establishment of the OpenSky Network, a worldwide volunteer aviation sensor network dedicated to enabling air-traffic analysis at scale for regulators, industry, and research institutions, which in 2020 provided flight data to the Bank of England for its quarterly Monetary Policy Report studying the economic impact of COVID-19 upon the UK.
2. Underpinning research
Modern Air Traffic Control (ATC) technologies are increasingly reliant on digital communication systems. These underpin aircraft surveillance, collision avoidance, and air-to-ground communications. Digitalisation of aviation technologies is driven by an international modernisation effort led by regulators such as the International Civil Aviation Organization (ICAO), US Federal Aviation Authority (FAA), and the European Organisation for the Safety of Air Navigation (EUROCONTROL); this effort is ongoing and will continue until at least 2035.
Research into air-traffic and communications security is undertaken by a team led by Professor Ivan Martinovic in the Department of Computer Science, University of Oxford, in collaboration with partners at Technische Universität, Kaiserslautern, and the Swiss government agency Armasuisse. This work began in 2012, with results published from 2013 onwards. The research output from these activities includes 6 journal articles and 12 conference papers (including best paper award at DASC 2015, an avionics venue). The work has focussed on four topics: (1) security in next generation air traffic surveillance (e.g., the ADS-B protocol); (2) privacy leakage from wireless air-to-ground data links (e.g., the ACARS protocol); (3) identification of encryption vulnerability used in aviation equipment manufactured by Honeywell; and (4) the open-access crowdsourcing network run by volunteers, OpenSky, which monitors over 98% of all European air traffic in real time.
(1) Active attacks against Automatic Dependant Surveillance – Broadcast (ADS-B) [R1, R3, R4].
ADS-B provides cheaper aircraft surveillance over a wider area – it is a key enabler for future air traffic control and its presence is mandated on aircraft by 2025. Research in [ R1] shows that message injection, modification, and deletion attacks on ADS-B are not only possible but inexpensive. We extended this work with a real-world feasibility analysis which concluded that safety-critical air traffic decision processes should not exclusively rely on the ADS-B system [ R3]. Our work in [ R4] used this research as a basis to assess the aviation industry perception of the security of systems such as ADS-B, identifying that, in many cases, industry professionals felt that aviation systems had security mechanisms where none in fact existed.
(2) Aviation data link private data leakage [R6].
Within [ R6] we conducted a measurement study to assess sensitive information leakage on a widely used aviation data link, the Aircraft Communications Addressing and Reporting System (ACARS). We identified that the use of ACARS by business, government, and military aircraft consistently undermines their efforts to obscure their movements from observation, by revealing flight details they otherwise seek to keep private. Commercial aircraft are also shown to transfer sensitive passenger details including names, onward destinations, and, in some cases, medical information or full credit card details transferred in the clear.
(3) Usage of weak encryption on data links [R5].
Extending topic (2), research presented in [ R5] revealed that a cipher used by many non-commercial aircraft to provide confidentiality on the Aircraft Communications Addressing and Reporting System (ACARS) can be readily broken. We assess the impact on privacy and security for its unsuspecting users by characterizing months of real-world data, decrypted by breaking the cipher and recovering the keys. In turn, [ R5] shows that the decrypted data leaks private and sensitive information including the existence, intent, and status of aircraft owners who otherwise attempt to protect their privacy, supporting our findings in [ R6]. This vulnerability has been reported (following the responsible disclosure process) to the manufacturer, Honeywell.
(4) Development of Crowdsourced Sensor Network [R2].
We co-founded the OpenSky Network crowdsourced sensor network as described in [ R2], established with the aim of collecting aviation surveillance signals worldwide for research purposes. The platform gathers messages and physical layer information sent by aircraft and drones, such as Mode S and ADS-B data, and makes it available for further analysis using scalable and efficient processing architecture. Since launch, OpenSky has grown into the largest aviation research platform worldwide, and currently (July 2020) processes around 280,000 messages per second; it covers 190 countries with over 2,000 sensors installed by volunteers. This has been leveraged in our work, including [ R5] and [ R6], where we used the data to identify aircraft concealing their movements.
3. References to the research
[ R1] M. Schäfer, V. Lenders, I. Martinovic: Experimental Analysis of Attacks on Next Generation Air Traffic Communication . 11th Int. Conf. on Applied Crypto. and Network Security (ACNS), 2013: https://doi.org/10.1007/978-3-642-38980-1_16.
[ R2] M. Strohmeier‚ M. Schäfer‚ M. Fuchs, V. Lenders, I. Martinovic: OpenSky: A Swiss Army Knife for Air Traffic Security Research. IEEE/AIAA 34th Digital Avionics Systems Conf. (DASC), 2015: https://doi.org/10.1109/DASC.2015.7311411. Best Paper Award.
[ R3] M. Strohmeier‚ V. Lenders, I. Martinovic: On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Comms Surveys & Tutorials, 2015: https://doi.org/10.1109/COMST.2014.2365951. In [ E6], as “Strohmeier 2013” (arXiv pre-print).
[ R4] M. Strohmeier‚ M. Schäfer‚ R. Pinheiro‚ V. Lenders, I. Martinovic: On Perception and Reality in Wireless Air Traffic Communication Security. IEEE Tr. on Intelligent Transportation Systems, 2017: https://doi.org/10.1109/TITS.2016.2612584.
[ R5] M. Smith‚ D. Moser‚ M. Strohmeier‚ V. Lenders, I. Martinovic: Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS. Int. Conf.on Financial Crypto. and Data Sec., 2017: https://doi.org/10.1007/978-3-319-70972-7_15.
[ R6] M. Strohmeier‚ M. Schäfer‚ M. Fuchs, I. Martinovic, V. Lenders: Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS). 18th Privacy Enhancing Tech. Symp. (PETS), 2018: https://content.sciendo.com/configurable/contentpage/journals$002fpopets$002f2018$002f3$002farticle-p105.xml
4. Details of the impact
Ongoing aviation modernisation efforts are focussing on improving efficiency and safety whilst lowering costs. Fundamental to this change is having more detailed data streams: this includes protocols used in ATC (Air Traffic Control)-related operations such as aircraft surveillance and collision avoidance, but also protocols used for general data-link communication between aircraft and ground stations, and carrying information such as the medical status of passengers and payment details for in-flight transactions.
Most of these systems were designed decades ago, and lack resilience against malicious actors under well-accepted modern threat models. The main reason for this is that ATC has long focussed on safety, i.e., making systems resilient to faults that occur naturally and unintentionally. This ‘historical mindset’ ignores intentional malicious behaviour, which is at the centre of security research. Our impact stems from our demonstration of the scope for malicious activity – providing the evidence base for policy changes throughout the industry. Concretely, our work has led to the following:
Impact on regulatory policy and commercial operations
Impact on national-level procurement
Open provision of aircraft data
Impact on Regulatory Policy and Commercial Operations.
At the international level, the International Civil Aviation Organization (ICAO) has recognised for the first time the need to validate ADS-B-derived information [ E1]. Our work is cited as evidence that ADS-B data cannot be solely relied upon for ATC, and so that a proposed full transition away from secondary transponder radar or multilateration systems cannot take place without new security measures.
At the level of national governance, our work is cited in policy documents or directly confirmed by government agencies in multiple countries. In 2016 the United States Department of Defense (DOD) issued a Call for Proposals for research towards securing ADS-B [ E2], referencing our work [ R3] as principal motivation. The call’s objective was to “develop a modular, secure, and affordable solution for Automatic Dependent Surveillance Broadcast (ADS-B) for Air Force platforms”. It uses our research as the primary evidence for the need to mitigate the lack of security in ADS-B: “while ADS-B will play an essential role in the future of air traffic control, the inherent lack of security measures in the ADS-B protocol is a reason for concern. The problem has recently been widely reported in the press and at hacker conventions. Academic researchers, too, proved the ease of compromising the security of ADS-B with current off-the-shelf hard- and software (Ref 2). It has also been estimated that it will cost billions of dollars to retrofit all DoD aircraft with ADS-B technology. Given these numbers and the looming ADS-B Out FY 2020 mandate, it is readily apparent that there is a need for a practical, secure and affordable solution to transitioning NextGen technology into the DoD/civilian fleet of aircraft.”
“(Ref 2)” refers to the preprint version of our paper [ R3] and in turn elements of [ R1] where the experimental analysis of active attacks on ADS-B was first conducted.
More recently, the United States Government Accountability Office issued a report to congressional committees in January 2018 on the “Urgent Need for DOD and FAA to Address Risks and Improve Planning for Technology That Tracks Military Aircraft” [ E3], again citing our work in [ R3]. In Switzerland, meanwhile, “based on the recent research insights regarding the insecurity of many civil and military aircraft communication systems” articulated in [ R1- R6], the government “has invested significant funds to build a new avionics laboratory in its headquarters in Thun” as “a priority undertaking”, and the Swiss Air Force “has decided to make a distinction between traditional electronic warfare threats and new cyber security threats to aircraft” [ E4]. Our work has further been incorporated in assessments of cyber-security for critical national infrastructure by the governments of Singapore [ E5] and Sweden [ E6], citing our work on ADS-B, and the Netherlands [ E7] (citing [ R1- R3]).
Indeed, our work has promoted awareness of cyber-security issues across the entire aviation community, from individual pilots [ E8] to airlines [ E9] – underpinning pressure on air traffic regulators to address the insecurity issues in aircraft data links. Swiss Air undertook system improvements to mitigate a vulnerability we discovered [ R5] and responsibly disclosed to them [ E9], in which passenger credit card details were broadcast without encryption whenever an onboard payment was made. Our work thereby benefitted not only Swiss Air from a data-protection perspective, but also any of the more than 16,000,000 passengers carried by the airline annually who have made onboard purchases since the system improvement.
Impact on National-level Procurement.
Armasuisse is the Federal Office for Defence Procurement within the Swiss Confederation. It is the sole procurement organisation for defence and civil protection purposes in Switzerland. They confirm in their letter [ E4] that our aviation security research has changed their procurement process in two major ways. Firstly, introducing the requirement for systems to provide physical-layer data to enable detection and mitigation of attacks on ATC communication links (based on our work [ R1- R6]). Secondly, requiring the inclusion of cyber-security testing in the procurement of national ATC surveillance systems. This testing particularly considers the fake message injection attacks identified in our work [ R3]. This second activity is already occurring in practice, with Armasuisse writing in [ E4]: “we have used approaches, knowledge, and software developed in collaboration with Oxford to conduct extensive in-the-field penetration testing of the new Multilateration system currently procured by the Swiss air traffic control company Skyguide”.
Open Provision of Aircraft Data.
The OpenSky Network operates over 2,000 sensors worldwide and serves approximately 3,000 members, including national air traffic regulators and EUROCONTROL (the Europe-wide air traffic body). The value of this open data is keenly recognised in the air-traffic sector. EUROCONTROL’s Performance Review Unit is incorporating feeds from the OpenSky Network into their activities in “monitoring and reviewing the performance of the pan-European air navigation services (ANS) system”, as part of a broader mission to coordinate and harmonise air-traffic management across Europe [ E10]. The unit notes that with the incorporation of the OpenSky Network as a source “[t]he additional data will enhance the tracking of aircraft movement, particularly in terms of better accuracy, higher reporting rate and faster access to data” [ E10].
The importance of open data has come rapidly into focus with the emergence of the COVID-19 pandemic. In an April 2020 publication [ E11], the International Monetary Fund (IMF) recommended the data provided by the OpenSky Network as a source for use in measuring an economy’s external sector (that country’s economic relationships with the rest of the world) when faced with emergency circumstances. Further, in May 2020, the OpenSky Network provided flight data to the Bank of England for the preparation of its quarterly Monetary Policy Report [ E12], which studied the economic impact of COVID-19 upon the UK. The data were used to highlight the sharp decline in the number of aircraft departures, both in the UK and worldwide. Data from the OpenSky Network is also referred to as a high-frequency indicator for gross domestic product (GDP) forecasting. The report states: “as business output surveys are providing a less useful steer than usual, Bank staff are using a wider range of indicators to gauge how GDP is likely to evolve”. Four data sources were highlighted as such high-frequency indicators, with the OpenSky Network the sole resource for flight traffic levels. This was contributory to the bank’s estimate that “monthly GDP will fall by enough in March to pull GDP down by around three percent” [ E12.1]. Use of OpenSky data continued in the following quarterly Monetary Policy (August 2020) [ E12.2].
In addition to the impacts on regulatory policy, commercial flight operations, and defence procurement arising from our work on the security of aircraft communications systems, the open provision of aircraft data through OpenSky has given rise to further impacts on national-level data policy and on systems development in industry. The development of OpenSky in collaboration with Armasuisse was itself a technical case study in big-data management for security and defence purposes [ E4]. Beyond uses in government and policymaking, OpenSky Network data is also integrated into more than 20 open projects including the LiveTraffic module for the commercial-grade and FAA-certifiable flight simulator X-Plane. (It is also included as core functionality in the free GeoFS flight simulator.) [ E13]. In industry, companies manufacturing ATC monitoring systems now provide interoperability with the OpenSky Network: for example, Günter Köllner Embedded Development GmbH (trading as jetvision), which produces and markets receivers specifically for the OpenSky Network [ E14]; and SeRo Systems GmbH, which also provides high-end sensors that are interoperable with OpenSky, and used for collection and processing of Mode S and ADS-B data for aviation traffic management [ E15].
5. Sources to corroborate the impact
[ E1] ICAO Technical Commission Working Paper, Document A39-WP/296, at para. 2.6: http://www.icao.int/Meetings/a39/Documents/WP/wp_296_en.pdf.
[ E2] US Department of Defence (2015): Call for Proposals for Modular, Secure and Affordable Design for NextGen ADS-B Integration: https://www.sbir.gov/sbirsearch/detail/870253.
[ E3] US GAO Report to Congressional Committees, GAO-18-177, Jan 2018, at pp. 15-16: https://www.gao.gov/assets/690/689478.pdf.
[ E4] Letter from Armasuisse Science and Technology Director detailing the impact of the Oxford research on policy and procurement, September 2020.
[ E5] Civil Aviation Authority of Singapore paper on Aviation Security: CAAS J. of Aviation Management, 2014, at pp. 73-84: https://saa.caas.gov.sg/journal-of-aviation-management.
[ E6] Swedish Defence Research Agency Report, December 2013, at p. 10.
[ E7] Netherlands Annual Review of Military Studies, 2016, at pp. 309-23: http://www.springer.com/la/book/9789462651340.
[ E8] Industry magazine article reporting the research: InterPilot March 2014, “Who controls your aircraft?”, at p. 24: https://www.beca.be/com-docman/safety/39-aviation-magazines/ifalpa-interpilot-magazine/99-ifalpa-interpilot-magazine.html.
[ E9] Evidence from responsible disclosure process with Swiss International Air Lines Ltd. and Lufthansa Technik AG.
[ E10] Supporting Statement from EUROCONTROL Performance Review Unit regarding the impact of OpenSky data on pan-European air traffic monitoring, March 2020.
[ E11] IMF Report, “Ensuring Continuity in the Production of External Sector Statistics During the COVID-19 Lockdown”, April 2020, at p. 10: https://www.imf.org/en/Publications.
[ E12] Bank of England, Monetary Policy Reports. (1) May 2020, at pp. 22, 34: https://www.bankofengland.co.uk/report/2020/monetary-policy-report-financial-stability-report-may-2020; (2) Aug 2020, at p. 26: https://www.bankofengland.co.uk/report/2020/monetary-policy-report-financial-stability-report-august-2020.
[ E13] Use of OpenSky data in commercial-grade flight simulator X-Plane ( https://twinfan.gitbook.io/livetraffic/) and open flight simulator GeoFS ( https://www.geo-fs.com/pages/credits.php).
[ E14] OpenSky Network Kit produced by jetvision: https://archive.vn/7QcNl.
[ E15] Letter from Managing Director, Sero Systems, regarding impact of OpenSky Network data on the company’s products.
- Submitting institution
- University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Summary impact type
- Technological
- Is this case study continued from a case study submitted in 2014?
- Yes
1. Summary of the impact
The Oxford programming tools team led by Oege de Moor developed a novel approach to program analysis that allows for automated application to complex problems and extensive amounts of code. Based on this research, de Moor and colleagues founded the successful spinout company Semmle. Semmle’s solution for “variant analysis” has benefitted product security teams at Google, Microsoft, Dell, Credit Suisse, Nasdaq, Uber, and many other organisations since 2013. The company’s open, community-driven approach to security – its free service for open source had a user community of over 700,000 developers in 2019 – has also provided wider economic and public benefit by helping to secure open source code. The success of this approach led to Semmle’s 2019 acquisition by the leading developer community platform GitHub, for an undisclosed sum estimated at over USD400,000,000. Semmle employed over 80 people across six sites worldwide at the time of the acquisition.
2. Underpinning research
In the early 2000s, the programming tools team at Oxford made considerable advances in a line of research on declarative program analysis. The initial emphasis was on functional programming. A major step, achieved in 2001 [ R1], was the development of a language for implementing optimising compiler transformations based on a combination of rewriting and side conditions phrased in temporal logic. A salient feature was the ability to bind free variables while matching the temporal logic formulae. This built on prior work by Sittampalam and de Moor, who had already created an efficient higher-order matching algorithm that was an example of selecting a pattern language in the sweet spot between expressivity (a bit more than 2nd order but not all of 3rd order) and efficiency. The implementation also heavily relied on ideas from logic programming. The results in [ R1] sparked a lot of interest in the research community, with groups led by Neil Jones (Copenhagen) and by Craig Chambers (University of Washington) taking up and further developing the theme. The link to restricted forms of logic programming became even more apparent at this point, and joint work by Sittampalam, Lacey, De Moor, and others explored this connection to express particular kinds of recursive analyses as logic programs that query control flow graphs [ R2]. Again, the key was to strike the right balance between expressivity and efficiency, by not using the full power of a Turing-complete language.
At that time ‘aspect-oriented programming’ was coming into prominence, and it appeared a perfect area of application for the technologies developed in the programming tools team. Briefly, aspects are a means to specify a declarative monitor to check properties in the execution of a software system. In 2003, we showed that the earlier work with Sittampalam could achieve dramatic speedups in the execution of aspect-oriented programs [ R3]. This became one of the most cited papers in aspect-oriented programming, and provided the foundation for our implementation of a new optimising compiler for the most popular aspect-oriented programming language, AspectJ, demonstrating that the theoretical speedups could be achieved at an industrial scale [ R4].
Meanwhile, a number of other research groups, including Laurie Hendren’s at McGill and Monica Lam’s at Stanford, had also started using Datalog, a much-restricted logic programming language, for program analysis. Hendren spent a sabbatical at Oxford in 2004, and her implementation via binary decision diagrams was used in the above work on aspect-orientation. At Oxford, de Moor’s group also provided a Datalog implementation for experimentation using traditional database technology instead of binary decision diagrams, building on previous work by Thomas Reps at Wisconsin (who also used it for program analysis applications) and others. It became apparent that no one understood the semantics of the event patterns (called “pointcuts”) of AspectJ properly, and therefore a clear semantics of its pattern language was required. The programming tools team addressed this question by translating that pattern language into Datalog [ R5], and giving a simple implementation through that translation [ R6]. By this point, the potential of Datalog as a basis for software analysis was evident.
3. References to the research
[ R1] D. Lacey, O. de Moor: Imperative Program Transformation by Rewriting. Compiler Construction (CC), 2001: https://doi.org/10.1007/3-540-45306-7_5.
[ R2] O. de Moor, D. Lacey, E. Van Wyk: Universal Regular Path Queries. Higher Order and Symbolic Comp., 2003: https://doi.org/10.1023/A:1023063919574.
[ R3] D. Sereni, O. de Moor: Static analysis of aspects. Aspect-oriented Software Dev. (AOSD), 2003: https://doi.org/10.1145/643603.643607.
[ R4] O. de Moor, D. Sereni, G. Sittampalam et al.: Optimising aspectJ. Prog. Lang. Design and Implementation (PLDI), 2005: https://doi.org/10.1145/1065010.1065026. Submitted to RAE2008.
[ R5] O. de Moor, D. Sereni et al.: Semantics of static pointcuts in aspectJ. Principles of Prog. Lang. (POPL), 2007: https://doi.org/10.1145/1190215.1190221 .
[ R6] E. Hajiyev, M. Verbaere, O. de Moor: codeQuest: Scalable Source Code Queries with Datalog. Eur. Conf. on Object-Oriented Prog. (ECOOP), 2006: https://doi.org/10.1007/11785477_2. Submitted to RAE2008.
4. Details of the impact
Pathway to impact. Semmle was founded in 2006 to create the novel technology that realises the potential of Datalog for software analysis demonstrated in the Oxford team’s research, widening the scope of application to business intelligence rather than just program analysis. Six US patents were filed by Semmle to protect these further advances after the creation of the company [ E1]. In September 2014 Semmle raised USD8,000,000 Series A investment from the leading venture capital firm Accel Partners. This allowed the team to expand from its Oxford office to two new sites in Copenhagen and New York, and to make the product enterprise-ready. The company grew from 18 employees in 2014 (FTEs: 18), to 35 following Series A investment (FTEs: 35), to 48 by 2018 (FTEs: 48). In August 2018 USD21,000,000 Series B funding was raised from a consortium led by Accel Partners. By the time of its 2019 acquisition by GitHub, a Microsoft subsidiary since its USD7,500,000,000 acquisition in 2018, Semmle employed 81 staff (FTEs: 81) across six offices in Oxford, San Francisco, New York, Seattle, Valencia, and Copenhagen [ E2, E14.3]. It is not possible to give confidential information about company revenue, or the sale price. However, business insights company Owler estimates 2019 annual revenue at USD10,000,000, and financial data company PitchBook estimates the sale price at USD410,000,000 [ E14.1, E14.2].
Semmle’s technology is built on a novel approach to program analysis that combines two disparate disciplines, object-oriented programming and database logic. By treating source code as a relational database, and analysis problems as queries against a database, deep semantic analyses can be expressed as concise queries in an object-oriented query language. The creation of such queries is an order of magnitude quicker than previous methods of creating code analyses. The query language is an object-oriented form of Datalog, whose evolution can be traced in [ R1– R6]. Cutting-edge techniques are used to make the queries perform well. Semmle’s analysis engine thus makes software easily and accurately searchable, allowing complex questions to be asked at a previously unachievable pace and scale [ E3, and below]. This REF period coincided with the application of Semmle’s technology to its ‘killer’ commercial use case, software security. Semmle’s unique solution for variant analysis – when a new vulnerability is identified in a software system, to find all occurrences of the same logical mistake in the same code base, or indeed in a portfolio of codebases – has delivered business-critical benefit to numerous major global clients since August 2013. These include Behavox, Credit Suisse, Dell, Google, Microsoft, Mozilla, Murex, NASA, Nordea, Uber, and other clients who cannot be named publicly. Three examples are described below. The period also saw the growth of Semmle’s wider contribution to software development and integrity through its open and shared approach to security. It made its CodeQL analysis engine freely available through an open analysis platform, LGTM.com, used by over 700,000 developers [ E7], and worked closely with top commercial security teams and the open source community to find and report vulnerabilities in widely used software [ E5.1–3, E6].
Software security and development in industry. Microsoft’s products and services are used by billions of individuals and millions of companies every day. When a software vulnerability is identified or reported, failure to find and patch all variants at the same time increases the risk of code being exploited in the wild. Since 2017 Microsoft has incorporated Semmle automation into its code review processes, using it to analyse bugs reported in a given component (for example the JavaScript engine of the Edge browser) and define queries that can find similar patterns in other components. A single such query has in many cases “provided a number of actionable results across multiple codebases”. Microsoft then store these queries in a central repository, to be re-run periodically by security teams across the organisation. In addition to variant analysis, Microsoft’s software researchers use Semmle’s technology proactively to review source code and identify vulnerabilities. Its ability to identify even the most complex semantic patterns means that an “explorative approach” can be maintained while automating what would otherwise be a “tedious and error-prone” process of manual audit. “Using Semmle to scale up our code review capabilities was an easy choice” (Security Software Engineer, Microsoft Security Response Center) [ E3, E4].
Nasdaq Corporate Solutions provides business and market intelligence through software and consultative services to thousands of organisations globally. After benchmarking static analysis tools and software analysis products, Global Corporate Solutions Technology (GCST) at Nasdaq chose Semmle’s LGTM product in 2018 as the only solution capable of running the continuous and accurate analytics needed to monitor development standards across a growing and highly complex application portfolio. Nasdaq have used Semmle analysis to provide actionable insights for strategic decision-making and budgeting across the organisation, enabling improved tracking of development projects, increasing the efficiency of engineering teams, and benefitting the individual developers who use Semmle’s tools. As a result, Nasdaq “completely changed the way people are writing code” (SVP of Global Corporate Solutions Technology), and brought down “technical debt” across the application portfolio (i.e., the implied future time and development cost accrued by using limited or imperfect solutions in the short term) by more than 75% within one year. This reduced software risk, and freed developer time for value-creating tasks [ E3].
BlackLine is a leading global provider of cloud financial software, serving over 2,300 organisations in more than 150 countries. After its initial public offering in late 2016, BlackLine turned to Semmle to meet the challenge of increasing the complexity of its code architecture by the addition of new software features and developments, while maintaining the security and integrity of its clients’ critical financial data. Blackline used the technology to identify complex data integrity issues, automate code review, and implement robust coding standards across the organisation. Blackline’s Director of Software Development was “blown away by [Semmle’s] power”; “no automated solution we had tried was able to find problems of this complexity, but using Semmle we became able to quickly find these types of issues across our portfolio. Within weeks this eliminated manual efforts that were consuming significant cycles of our SDLC” (Software Development Life Cycle). Using Semmle to enforce the organisation’s coding standards, moreover, enabled BlackLine “to reduce our maintenance spend drastically”. “On top of that, our developers are relieved of routine tasks related to maintenance work and can now focus on the creative side of their work” [ E3].
Securing open source software. Almost every software product today relies on open source code at some point in its supply chain. Through its commitment to security as a shared responsibility, Semmle has made a significant contribution to reliably securing such code, benefitting both developers and the consumers of software, and helping to ensure the continued growth and sustainability of open source. Semmle’s technology was made freely available to open source developers through its LGTM.com analysis platform, allowing them to run shared queries against their code or create their own. As of January 2020, the service analysed every commit on over 135,000 projects worked on by a user community of over 700,000 developers [ E7]. Security research findings contributed by Semmle’s security research team and by its customers were shared through an open Git repository, amplifying the expertise of top security researchers across the world [ E5.1]. Semmle’s security research team also directly discovered and reported many vulnerabilities in open source projects [ E5.2]. By September 2019, when Semmle was acquired by GitHub, the team had responsibly disclosed over 100 CVEs (Common Vulnerabilities and Exposures) in high-profile projects like U-Boot, Apache Struts, the Linux Kernel, Memcached, VLC, and Apple’s XNU, allowing project developers to patch vulnerabilities and protect users [ E5.2]. As GitHub’s SVP of Product noted, Semmle’s unique approach to code analysis “makes Semmle far more effective, finding dramatically more issues and with far fewer false positives”: “just as relational databases make it simple to ask very sophisticated questions about data, Semmle makes it much easier for researchers to identify security vulnerabilities in large code bases quickly… Because QL [Semmle’s analysis engine] is declarative and object-oriented, creating a new analysis is much easier than with traditional code analyzers. Customers frequently find vulnerabilities they couldn’t find with other tools and accomplish tasks that used to take weeks or more in hours” [ E10.3]. Some of the vulnerabilities discovered using the technology have had drastic data security implications. In 2017 and 2018, for example, Semmle security researchers discovered critical remote code execution (RCE) vulnerabilities in Apache Struts, a widely used framework for Java applications [ E8]. Equifax’s failure to patch a similar RCE vulnerability in Apache Struts earlier in 2017 led to a serious data breach that had directly cost the company USD440,200,000 by the end of 2018 [ E9]. According to some expert commentators, the 2018 Semmle-discovered vulnerability was potentially even more concerning than the previous RCE vulnerabilities, including the one exploited in the Equifax breach, because it “operates at a far deeper level within the code” [ E6.2, at pp. 15–17: synopsys article on CVE-2018-11776, August 2018].
The success of its open, community-driven model allowed Semmle to double its customer base and to increase open source usage tenfold in the year 2018/19, resulting in its acquisition in September 2019 by GitHub, the leading global platform for open source resources and collaboration. GitHub announced their excitement in “bring[ing] the world’s most powerful semantic code engine to the world’s largest developer community” [ E10.1], describing the move as “a big step in securing the open source supply chain” [ E10.2]. GitHub’s CEO called Semmle’s engine “revolutionary”, and the SVP of Product stated that “no other code analysis tool has a similar success rate” in finding vulnerabilities [ E10.2 & 3]. The CEO stated: “Semmle’s community-driven approach to identifying and preventing security vulnerabilities is the very best way forward… As a community of developers, maintainers, and researchers, we can all work together toward more secure software for everyone” [ E10.2]. Following the acquisition, the Semmle security research team formed the core of a new GitHub Security Lab, which was launched in November 2019 with the mission to find vulnerabilities in open source projects and to make tools available “to make it easier for others to find those vulnerabilities within their own codebases” [ E11.1 & 2]. Semmle’s “industry-leading semantic code analysis engine”, CodeQL, was accordingly released as a GitHub product in November 2019 [ E11.2, E12.1]. It is free for research and open source, and is available to all public repositories and enterprise customers via GitHub’s continuous integration and deployment service [ E12.2]. As of July 2020 GitHub reported having over 50,000,000 developer accounts, over 2,900,000 enterprise accounts, and over 100,000,000 repositories worldwide [ E13].
5. Sources to corroborate the impact
[ E1] US patents (2008–12). US20090240649 A1: http://tiny.cc/e8hukz; US20090177640A1: http://tiny.cc/faiukz; US20090234801A1: http://tiny.cc/ldiukz; US20120016912A1: http://tiny.cc/80jukz; US20130055205A1: http://tiny.cc/yyjukz; US20130232160A1: http://tiny.cc/xsposz.
[ E2] Corroborator 1: Semmle company information will be corroborated by the former CEO of Semmle.
[ E3] Approved public customer case studies ( https://semmle.com/case-studies). Microsoft: http://tiny.cc/my79iz; Nasdaq: http://tiny.cc/x079iz; BlackLine: http://tiny.cc/zx79iz.
[ E4] Microsoft Security Response Center blog posts on their use of Semmle technology: (1) http://archive.ph/QzDZ2; (2) http://archive.ph/8rmZs; (3) http://archive.ph/3mxJC.
[ E5] Semmle security research: https://semmle.com/security. Note that Semmle Security Research has been absorbed by GitHub, and links now resolve to GitHub Security Lab pages.
(1) Semmle open query library (a large library of re-usable queries covering known vulnerabilities, contributed by Semmle and its customers and partners): https://github.com/Semmle/ql.
(2) 100+ CVEs found and reported by Semmle in open source projects (page harvested on 4 March 2020): https://lgtm.com/security/#disclosures ( https://archive.vn/SETK7). Note that this list has migrated from Semmle to the GitHub Security Lab domain; [ E7.2 & 3] confirm the provenance in Semmle research. Each CVE links to its National Vulnerability Database entry, with details of advisories and patches.
(3) CVE proof of concept videos and technical deep dives: https://semmle.com/security.
[ E6] Web media coverage of selected Semmle-discovered CVEs (2017–2020): (1) Apple OS XNU kernel; (2) Apache Struts; (3) Facebook Fizz; (4) Google Chrome; (5) U-Boot loader (commonly used with Linux kernel); (6) VLC.
[ E7] LGTM.com ( http://archive.ph/IstFg): Semmle code analysis platform, free for open source projects, showing usage and project stats (as of January 2020, over 39,000,000 commits by more than 700,000 developers analysed for 135,821 open source projects).
[ E8] RCE vulnerabilities in Apache Struts: CVE-2017-9805 and CVE-2018-11776.
[ E9] Equifax 4th quarter results, 2017: https://archive.vn/Er5sx; 2018: https://archive.vn/l0FNv.
[ E10] GitHub communications regarding acquisition of Semmle: (1) Tweet from GitHub account ( http://archive.ph/RowTx), and blog posts by (2) GitHub CEO ( http://archive.ph/lPIRK), and (3) GitHub SVP of Product ( http://archive.ph/ujuKV).
[ E11] GitHub Security Lab: (1) team: https://securitylab.github.com/; (2) launch blog post, November 2019 ( https://archive.vn/F3tFT).
[ E12] GitHub CodeQL (1) product ( https://securitylab.github.com/tools/codeql), and (2) documentation ( https://archive.vn/GWPvT).
[ E13] GitHub data (page archived 26 July 2020): https://archive.vn/NFyVN.
[ E14] (1) PitchBook estimate of Semmle sale price: http://archive.ph/kRecU. (2) Owler estimate of Semmle annual revenue 2019: http://archive.ph/pkjse. (3) TechCrunch article reporting Series B (and Series A) investment rounds: https://archive.vn/uM0hf
- Submitting institution
- University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Summary impact type
- Technological
- Is this case study continued from a case study submitted in 2014?
- No
1. Summary of the impact
Location tracking is notoriously difficult inside buildings, where GPS does not work. To address this challenge, Trigoni’s research group has developed a frictionless infrastructure-free indoor positioning solution based on smartphones, which avoids the significant cost and effort required to deploy existing solutions. Their award-winning map matching and pedestrian dead reckoning algorithms are licensed to Navenio, a University spinout founded by Trigoni in 2015. Since then, Navenio, which employs over 65 people, has applied the technology in multiple NHS trusts to build a workforce tracking and tasking solution for porters and other hospital staff. The new positioning technology and the enhanced analytics that it makes possible have helped NHS hospitals to reduce costs, use resources more efficiently, and improve compliance outcomes. These efficiencies have further resulted in changes in management practice, with the technology enabling a data-led approach to resource and workflow management; improved experience and outcomes for user groups within the hospital, such as porters and nurses; and improved patient experience and outcomes, as waiting times are reduced and staff time is freed for patient care.
2. Underpinning research
The state of the art in the indoor positioning systems market consists of solutions based on bespoke hardware infrastructure, such as Bluetooth, UWB, magnetic, or acoustic beacons. These require extensive beacon infrastructures placed throughout the target building, resulting in slow (4–6 months) and costly implementation. Existing solutions based on Wi-Fi access points – i.e., already-existing infrastructure in the building – require labour-intensive surveys, which can take 1–2 months for large multi-building hospital sites, and require frequent updates through repeat survey efforts every few months. To address this challenge and achieve a solution that avoids infrastructure and survey costs, Trigoni’s group has worked on three novel technologies:
Robust Pedestrian Dead Reckoning. Work in [ R1] focussed on robustly tracking the relative motion of a smartphone no matter how the user holds the phone while walking (on swinging hand, texting, making a phone call, in shirt pocket, or trouser pocket). This work was based on two key insights: a novel classification scheme for device attachment, and an algorithm for correcting drift of acceleration and gyroscope data and robustly estimating device orientation.
Lightweight Map Matching. In order to further refine the trajectories generated by the pedestrian dead reckoning algorithm, it is possible to exploit knowledge of the internal layout of the building (i.e. floorplans). Whereas previous approaches used Bayesian filters based on directed graphical models (e.g. Kalman filters and particle filters), Trigoni’s group proposed a novel approach based on conditional random fields (undirected graphical models) [ R2, R3]. The new map matching algorithm makes it possible efficiently and robustly to capture spatio-temporal correlations in the noise of sensor data and to increase the tracking accuracy, while remaining lightweight enough in terms of processing time to run locally on smartphones without compromising performance or battery life.
Indoor Positioning with Lifelong Learning. The third research contribution, in [ R4], is the idea of exploiting the interaction between the pedestrian dead reckoning and map matching algorithms to improve the tracking accuracy of users in a building over time. In other words, the more the localisation app is used, the more accurate it becomes. Parameters are fine-tuned automatically to fit the particular walking style of the user, the specific noise profile of the sensors of the particular smartphone device, and the layout of the building.
3. References to the research
[ R1] Z. Xiao‚ H. Wen‚ A. Markham, N. Trigoni: Robust pedestrian dead reckoning (R−PDR) for arbitrary mobile device placement. 5th Int. Conf. on Indoor Positioning and Indoor Navigation (IPIN’14), 2014: https://doi.org/10.1109/IPIN.2014.7275483.
[ R2] Z. Xiao‚ H. Wen‚ A. Markham, N. Trigoni: Lightweight map matching for indoor localization using conditional random fields. Int. Conf. on Information Processing in Sensor Networks (IPSN'14), 2014: https://doi.org/10.1109/IPSN.2014.6846747. Best paper award.
[ R3] Z. Xiao‚ H. Wen‚ A. Markham, N. Trigoni: Indoor tracking using undirected graphical models. IEEE Tr. on Mobile Computing, 2015: https://doi.org/10.1109/TMC.2015.2398431.
[ R4] Z. Xiao‚ H. Wen‚ A. Markham, N. Trigoni: Robust Indoor Positioning with Lifelong Learning. IEEE J. on Selected Areas in Comms, 2015: https://doi.org/10.1109/JSAC.2015.2430514. Submitted to REF 2021.
4. Details of the impact
Route to impact. The research contributions were protected through two patent applications: one on map matching and lifelong learning [ R2– R4] has been granted in the US and Australia and is under consideration in Europe and China; one on pedestrian dead reckoning [ R1] is under consideration in the US, Europe, China, and Australia [ E1]. These patent applications were licensed to Navenio Ltd in December 2015. The algorithms have since been further refined by Navenio’s engineers under the guidance of Trigoni [ E2], making them robust enough to be deployed in complex multi-building hospital sites.
In 2018, Navenio received GBP427,714 in funding from the GBP17,000,000 Digital Health Catalyst competition run by UKRI, to develop their tracking technology – “an Uber for porters” that enables hospital staff to be in the right place at the right time [ E3]. Navenio has developed two location-based services that use the novel indoor positioning technology developed by Trigoni’s research group in [ R1– R4]: 1) an intelligent workforce solution (IWS) for porters and other hospital staff; and 2) a cleaning compliance solution for hospitals.
Economic impact of Navenio. Navenio initially deployed their technology into two Manchester hospitals in 2018, and in the 2017–2018 financial year reported income of GBP175,782 and provided employment to 24 people. In 2018–2019 the company reported income of GBP489,326 and employed 58 people. In May 2020, Navenio raised GBP8,850,000 in a Series A funding round led by QBN Capital [ E2]. As of December 2020, Navenio employed 67 staff (headcount: 67; FTEs: 65.2) and 3 consultants, with contracted annual recurring revenue of approximately GBP700,000 [ E4]. The company has deployed its IWS portering technology to 9 UK NHS hospitals across 7 NHS trusts: Tameside and Glossop Integrated Care; Manchester University; North Tees & Hartlepool; Buckinghamshire Healthcare; East Kent Hospitals; Epsom & St Helier; and Royal Cornwall. Over 400 portering staff and over 700 task requesters in these hospitals are using the technology daily [text removed for publication] [ E4].
At the 2020 annual Women in IT Awards, Trigoni was named CTO of the Year, recognising not only the impact of Navenio’s technology services in healthcare to date, as documented below, but also Trigoni’s important impact on diversity through her leadership role in a sector where female representation still stands at only 19% [ E5].
Impacts on organisational efficiency in the NHS. Navenio uses intelligence about a hospital, its workflows, and the tasks it needs to perform in order to determine the optimal way of completing portering or cleaning tasks, and provides real-time tasking and tracking to streamline staff workflows. As evidenced below, the technology allows hospitals to identify and address non-optimised staff workflows, rota management, and resource utilisation. This leads to greater task completion at higher speed, reduced loss of ward staff time, and reduced spend on agency and helpdesk staff. The technology also enables the provision of data on employee activity, task completion, and adherence to the Service-Level Agreements (SLAs) with which hospital trusts are required to comply. These operational insights, provided via an analytics dashboard, allow trusts to make evidence-based improvements in resource use and allocation, and to avoid fines for non-compliance with SLAs.
Workflow efficiency and cost savings. A major inefficiency currently experienced in NHS hospitals is the significant amount of nurses’ time spent on portering tasks, due to difficulties in finding and tasking porters. Ward staff allocate tasks to porters via a helpdesk, with tasking affected by uncertain availability, and often reliant on individuals’ site or staff knowledge. High call volumes can lead to delays and even service failure, and nurses’ time is frequently spent chasing porters or completing portering tasks themselves. This reduces the time nurses spend on core patient care tasks, while hospitals recruit costly agency staff to make up for the shortfall.
Navenio’s IWS has allowed hospital management to correct such inefficiencies and identify others, leading to substantial cost savings. The deployment of the technology across three hospitals in the East Kent trust, for example, led between November 2019 and September 2020 to a 15% reduction in portering calls to the helpdesk [text removed for publication] [ E6.1]. Since its deployment at Tameside and Glossop in December 2017, the technology has removed the need for a helpdesk altogether, releasing capacity of 40 hours per week [ E7.2]. Service delivery for portering has improved dramatically: Tameside and Glossop have recorded a 94% increase in portering tasks completed, while task response times and task completion times are 40% and 12% quicker respectively [ E7]. At the East Kent trust, 18% more tasks are handled, despite reducing helpdesk calls; speed of task assignment has increased by 39%; task response times are 29% faster; 26% more tasks are completed; and 10% fewer tasks are cancelled. As a result, it is estimated that East Kent Trust hospitals have saved “up to 200 hours per week” of ward staff time previously spent “carrying out porter duties or chasing porters”, with this time now freed for patient care [ E6.2, E6.1]. Tameside and Glossop have also recorded 175 hours per week of released ward capacity, “as a function of reducing the need for ward staff to carry out portering tasks” [ E7].
These gains are achieved through the technology’s intelligent workflow optimisation, not by placing additional pressure on personnel: portering staff now walk fewer miles (per hour per resource), and “positive feedback has been received from all users”, including porters [ E6.1, E8]. At Tameside and Glossop, the Logistics Manager reports that “ward staff are able to book tasks quickly, and then be kept up to date on task progress – allowing them to plan their days better, in turn freeing up more of their time for patient care”, while “porters find the solution easy to use – it allows them to focus on the most important tasks and ensures daily tasks are handled with the minimum amount of effort” [ E7].
Evidence-based resource allocation. The detailed analytics enabled by Navenio’s location-tracking technology have informed changes in resource alignment at NHS hospital trusts. At East Kent, the data “informs decision making and has allowed the Facilities Management team to review their staffing demand and understand where improvements need to be made. This allows for optimisation of staff productivity and allows managers to put forward a business case for an increased number of porters if needed” [ E6.1]. The Facilities Manager states: “we have found the data from Navenio to be invaluable, it has allowed us to see a true reflection of what is actually going on ‘on the floor’. Previously our data was just a data dump … but now we get to see where the operational focus should be” [ E6.1]. Fine-grained resource demand analysis, “with the changing hospital flows, down to 15-minute intervals”, has allowed departments across the hospital “to change their way of working to avoid unnecessary delays”, and “overflow one team to another team when there is unexpected capacity or an increase in a specific service demand, i.e. COVID-19” [ E6.1].
Insights based on location tracking can also highlight significant problems that were previously invisible. At one hospital, Navenio showed that a much higher volume of blood samples was being collected than at comparably sized sites [text removed for publication] [ E6.1].
Data-enabled management. The actionable insights provided by the Navenio technology have resulted in changing management practices at hospital trusts, where Navenio data has been incorporated into regular decision-making processes. The East Kent trust uses Navenio’s insights to give “all managers a complete overview of what has happened and where workflow can be improved”, and “monthly review calls are carried out to help managers understand and interpret the data so it can be used to improve processes and be disseminated for presentation to the board” [ E6.1]. The Facilities Manager reports that “Navenio and our teams have…spent time building up our portfolio of data to feed into the SLT and Board papers to ensure that they see the highlights and trends they need to inform decision making” [ E6.1].
Other trusts similarly report wider benefits flowing from data-enabled decision-making. At Tameside and Glossop, “management now have access to highly usable information, providing fascinating insights on operational practices and compliance levels, and that helps us address inefficiencies across the organisation as a whole” [ E7]. In April 2019, the Care Quality Commission drew special attention in a Use of Resources report to these ‘Outstanding Practices’ for improving care at NHS Tameside: “the trust was able to demonstrate a clear theme of using technology and innovation to improve productivity throughout the trust through examples such as… Navenio – a portering app which monitors all portering activity in real time, with a live dashboard to inform team leaders of any demands on the service. The app has allowed the trust to review activity and response, has removed the need for clinical staff to pick up portering duties due to unavailability, has resulted in a reduction in the time spend logging calls and a reduction in overtime by increasing shift efficiency” [ E9]. The impact of Navenio’s technology across the breadth of hospital operations is recognised by new clients, who are investing in order to become “truly data-led organisation[s]” [Managing Director, NTH Solutions (facilities management for North Tees and Hartlepool Hospitals NHS Foundation Trust): E10].
Impacts on cleaning standards and compliance outcomes. The Navenio system configuration takes into account hospital compliance requirements, and analytics are generated that allow hospital management to monitor and improve compliance outcomes. These insights can mitigate significant financial risks for hospital trusts, whose SLAs include provisions for substantial financial penalties correlated with performance targets. Hospitals have reported measurable improvements in compliance outcomes due to the use of Navenio: in August 2019, for example, Queen Elizabeth The Queen Mother Hospital achieved task handling compliance levels for portering tasks of 100% for emergency moves, 97.3% for urgent moves, and 96.2% for routine tasks. Overall, facilities management for the three East Kent hospitals recorded a 12% increase in task compliance in the 10 months following November 2019 [ E6.1]. Tameside recorded SLA compliance of 95% using Navenio [ E7]. At [text removed for publication], potential fines were identified by feeding Navenio’s data insights into the hospital’s PAYMECH compliance system. The hospital was then able to avoid penalties by adapting staffing capacity in response.
In 2020, Navenio won GBP441,616 in UK government funding to develop their applications to support the NHS in dealing with COVID-19 [ E12]. This accelerated the development and launch of Navenio’s cleaning compliance solution, which has already been purchased by 5 hospital customers [ E4]. The tracking and tasking solution improves workflow and resource efficiency to achieve greater task completion and better cleaning standards and compliance. The technology can also be used directly to identify sources of hospital-acquired infections by determining which staff and assets have been in contact with infected patients.
Impacts on staff and patient experience and healthcare delivery. The efficiencies enabled by Navenio’s IWS have benefitted staff user groups across NHS hospitals, with concomitant benefits for healthcare delivery. As part of the deployment process, Navenio gathers requirements from all relevant staff and departments, such that staff feel they are fully “able to input our needs into the system” [Radiology Lead, Epsom & St Helier: E8], and provides training to all users of the technology. Necessary adaptations are made, e.g. for partially sighted users. For portering and cleaning teams, adoption can mean a wholesale shift to a digital working culture. The technology has been embraced because it has shortened journey times, eliminated unnecessary journeys, and made it easier for porters and cleaners to manage their workload (for example, a porter stated: “it knows what stage of the task you are on…it will make things so much easier”) [see staff feedback in E6.1, E8].
The experience of clinical staff, and in turn the quality of patient care, has improved as a direct result. At Tameside “ward staff are able to book tasks quickly, and then be kept up to date on task progress…freeing up more of their time for patient care” [ E7]. At Epsom & St Helier, “we now have visibility of when porters have accepted tasks, an estimate of when they will arrive and their progress. It has really improved the situation for staff and patients alike” [ E8]. Patients experience these benefits in the form of faster response times (at the East Kent trust “response time to patients has been 29% faster, reducing from an average of 14 minutes to 9.9 minutes”), and more time for clinical staff to care for patients, “as they are spending less time doing porter tasks or chasing completion of porter tasks” [ E6.1]. This translates both into better patient care – for example, faster turnaround times for X-rays – and improved patient safety, as in the blood sample case described above. An April 2019 CQC inspection report noted that NHS Tameside had been rated ‘Good’ for medical care service responsiveness in part because “technology had been used to improve productivity and understand service demand and capacity” [ E11].
5. Sources to corroborate the impact
[ E1] International patents filed Sep. 2015: WO/2016/042296A2; WO/2016/042296A3.
[ E2] Navenio Ltd full accounts (2017–19) at CH, incl. records of Trigoni’s consultancy.
[ E3] Digital Health Catalyst competition grant and gov.uk press release, September 2018.
[ E4] Letter from Head of Operations, Navenio Ltd, confirming information about the company and contracted services.
[ E5] Women in IT Awards 2020 winners: http://archive.vn/S7GWq.
[ E6] (1) Health Service Journal Awards 2020 entry document and (2) approved customer case study from Associate Director of Commercial Solutions, 2gether Solutions (facilities management for East Kent Trust).
[ E7] (1) Testimonial and (2) approved customer case study from Logistics Manager, Tameside and Glossop Integrated Care NHS Foundation Trust.
[ E8] Approved customer case study from Radiology Superintendent, Epsom & St Helier University Hospitals.
[ E9] Care Quality Commission Use of Resources Report (July 2019), at pp. 5, 9, 11: https://www.cqc.org.uk/sites/default/files/Tameside_and_Glossop_Integrated_Care_NHS_Foundation_Trust_Use_of_Resources_published_04_July_2019.pdf.
[ E10] Approved customer case study from Managing Director, NTH Solutions.
[ E11] Care Quality Commission Inspection Report (July 2019), at pp. 6, 28, 40: https://www.cqc.org.uk/location/RMP01/reports
[ E12] Innovate UK COVID-19 response funding for Navenio, Jun. to Aug. 2020: https://gtr.ukri.org/projects?ref=60094 and https://gtr.ukri.org/projects?ref=77726.
- Submitting institution
- University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Summary impact type
- Technological
- Is this case study continued from a case study submitted in 2014?
- No
1. Summary of the impact
Oxford University research on weaknesses in wireless protocols uncovered critical flaws in multiple parts of the Bluetooth standard, as implemented in billions of devices worldwide (almost 3,000,000,000 Bluetooth BR/EDR devices were shipped in 2019 alone). The research demonstrated how both the Bluetooth session key establishment and the authentication procedures can be completely compromised by an external adversary, allowing attackers to circumvent the protections between devices to intercept, monitor, or manipulate communication at will and to impersonate previously-paired devices. The research team’s coordinated disclosure to industry of each vulnerability in turn underpinned substantial efforts to remedy them before they could be discovered and misused by malicious parties. The work led to changes to the Bluetooth Core Specification, and to mitigations applied by major manufacturers (including Intel, Microsoft, Apple, Cisco, Google, and Huawei). These have protected Bluetooth-enabled devices that were previously vulnerable, preventing significant harm to both manufacturers and consumers.
2. Underpinning research
The claimed impact results from a programme of research investigating low-level communication interfaces for mobile devices, in particular the initialisation of communication sessions and mutual authentication of communicating parties. The research was led by Professor Rasmussen, in collaboration with researchers from Singapore University of Technology and Design (Nils Ole Tippenhauer and Daniele Antonioli, both of whom have since changed their affiliation). Secure communication between two devices requires a secret channel to be established and the identity of each party to be verified. Major technologies such as Bluetooth must ensure that these requirements are met throughout the provision of useful services, because they are critical to safe use of the technology by the public. If a secret channel is not properly established, then a malicious party can steal private information and forge data or instructions. If participants’ identities cannot be verified, then a malicious party can masquerade as a legitimate one, sidestepping the benefits of a secret channel. For example, by breaking a secure channel, a file sent between devices can be stolen or altered, a password entered on a wireless keyboard can be monitored, or a typed account number can be changed. Through impersonation of a legitimate device, a vehicle can be unlocked and driven away, a mobile phone opened, or a smart home-security system deactivated.
Work led by Kasper Rasmussen investigated the twin challenges of secure session initialisation and mutual authentication in the systematic security analysis of existing systems [ R1– R4]. This work led first to the identification of previously unknown deficiencies in location services used by Android mobile devices [ R1]. A particular concern was the ability for an attacker to ‘downgrade’ communication security by manipulating parameters in a session initialisation. These insights were then applied in the security analysis of ubiquitous Bluetooth technology – ultimately identifying a critical design flaw allowing the downgrade of a key security parameter, and thus the compromise of the secure channel. This was the Key Negotiation of Bluetooth (KNOB) attack [ R2, R4]. Further work on Bluetooth then discovered that a malicious party could masquerade as a trusted device by misleading a victim device in several ways during the session initialisation protocol. These attacks collectively became known as Bluetooth Impersonation AttackS (BIAS) [ R3].
The paper presenting the first Bluetooth vulnerability (KNOB) [ R2] described an attack on the session key negotiation protocol of Bluetooth BR/EDR. The paper was published in August 2019, following an embargo period to support the responsible disclosure process. The attack allows a third party, without knowledge of any secret material (such as link and encryption keys), to force a downgrade by making two (or more) victims agree on a session key with only 1 byte (8 bits) of entropy. Such low entropy enables the attacker to easily brute force the negotiated keys (only 256 values), decrypt the eavesdropped ciphertext, and inject valid encrypted messages (in real-time). The attack is stealthy because the key negotiation is transparent to the Bluetooth users. The attack is standard-compliant because all Bluetooth BR/EDR versions are required to support session keys with entropy between 1 and 16 bytes and do not properly secure the key negotiation protocol. Due to the support of Bluetooth for simple and low-power devices, there is no known implementation that applies any security protocols above the communication encryption.
The second Bluetooth vulnerability (BIAS) [ R3], published after embargo in May 2020, allows an attacker to downgrade the use of the Bluetooth Secure Connections mode to an insecure Legacy mode by falsely claiming that Secure Connections are not available (even if the genuine link was originally established with Secure Connections). The Legacy mode authentication only requires authentication of one party (the Master device) in the communication. The paper further shows that an attacker can trigger a Master-Slave role switch to avoid undertaking even the one-way authentication, thereby masquerading as a trusted, paired device despite having no knowledge of the long-term link key. The use of both attacks in sequence allows complete compromise of any established trust relationship between devices and the secrecy of communicated data – entirely breaking Bluetooth BR/EDR security without being detected.
In both cases, the attacks target the firmware of the Bluetooth chips because the firmware (Bluetooth controller) implements all the security features of Bluetooth BR/EDR. As standard compliant attacks, they are effective on any firmware, and on any device, that follows the specification. The KNOB attack [ R2] was implemented on more than 14 Bluetooth chips from popular manufacturers such as Intel, Broadcom, Apple, and Qualcomm, with all tested devices being vulnerable. The BIAS attack [ R3] was conducted against more than 28 unique Bluetooth chips, which were all found to be vulnerable.
3. References to the research
[ R1] D. Antonioli‚ N. O. Tippenhauer, K. Rasmussen: Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google's ‘Nearby Connections’ on Android. Network and Distributed System Security Symposium (NDSS), 2019: https://dx.doi.org/10.14722/ndss.2019.23367. Submitted to REF 2021.
[ R2] D. Antonioli‚ N. O. Tippenhauer, K. Rasmussen: The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. USENIX Security Symposium, 2019: http://tiny.cc/cfv0tz.
[ R3] D. Antonioli‚ N. O. Tippenhauer, K. Rasmussen: BIAS: Bluetooth Impersonation AttackS. IEEE Symposium on Security and Privacy (IEEE S&P), 2020: https://doi.org/10.1109/SP40000.2020.00093. Submitted to REF 2021.
[ R4] D. Antonioli‚ N. O. Tippenhauer, K. Rasmussen: Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Tr. on Privacy and Security (TOPS), 2020: https://doi.org/10.1145/3394497. Submitted to REF 2021.
4. Details of the impact
Our research exposed critical failures in the security of Bluetooth that nullified the confidentiality and authentication properties of the technology. Bringing these facts to light carries direct impacts: in making unknown security risks known, in allowing informed choices to be made by manufacturers and users of Bluetooth, and in directing the development of commercial communication systems. However, the most profound impact of this programme has come from the research team’s coordinated disclosure process, which has repeatedly allowed the most serious risks to be mitigated before they can be abused – thereby preventing their potential harm. As Bluetooth is in use at enormous scale (almost 3,000,000,000 Bluetooth BR/EDR devices were shipped in 2019 alone [ E4.1]), and the exposed vulnerabilities affected all standard-compliant devices, the steps taken to remedy the deficiencies found by the research team have helped protect the security and privacy of a substantial proportion of the world’s population.
The coordinated disclosure of security vulnerabilities is a pillar of beneficial security research. Once discovered, a vulnerability is reported to the affected standards bodies and manufacturers so that they can remedy it before it becomes publicly known. The research team provides details of their discovery and analysis, interacting with industry security specialists as they devise an appropriate countermeasure. One researcher typically acts as the point-of-contact between the research team and the industry parties. Papers describing vulnerabilities are embargoed from public release before a given publication deadline to allow the remediation to take place in secret. During this process, vulnerabilities are assigned a Common Vulnerabilities and Exposures (CVE) Identifier and evaluated for severity using the Common Vulnerability Scoring System (CVSS). This provides a clear and common format for controlled distribution to affected manufacturers, along with a measure of criticality for prioritising fixes. Typically, researchers will have proposed potential mitigations in their papers, which can form the starting point for practical fixes. When successfully executed, the coordinated disclosure process allows critical vulnerabilities to be fixed for the majority of users before the vulnerabilities can be maliciously exploited. This provides an obvious benefit to the users themselves, be they individuals or businesses, and also to the manufacturers who avoid the costs and liability of security breaches resulting from the vulnerability. As such, firms often operate Bug Bounty programmes to reward researchers for their efforts.
The coordinated disclosure process was conducted twice by Kasper Rasmussen’s research team, with contact first made for the KNOB vulnerability described in [ R2 & R4] and the established relationships then used for the BIAS work in [ R3]. The result of [ R2] was initially reported to the Bluetooth Special Interest Group (SIG) and CERT Coordination Center (CERT/CC) in October 2018. This established communication with Intel, who were the responsible partner for the cross-industry Unified Security Incidence Response Process (USIRP) as defined by the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) [ E1]. The research team was in dialogue with Intel from January 2019 onwards regarding action to coordinate mitigation efforts, with Antonioli acting as the point-of-contact via email and telephone. The research paper was embargoed until August 2019 to aid these efforts. The later work in [ R3] was reported in December 2019 through the same channels, with the associated paper embargoed until May 2020. In both instances, the research team provided detailed technical information, analysis, and potential countermeasures as derived from their work.
The main point of contact for the research team in both cases was with the Intel Product Security Incident Response Team (iPSIRT). In addition to chairing the USIRP, Intel also conducted their own vulnerability remediation, as a major manufacturer of Bluetooth devices. As the collaboration progressed, the research team was in direct contact with ICASI as well as through Intel, further working with CERT Coordination Center (CERT/CC) and the Bluetooth Special Interest Group (SIG) directly. CERT/CC is a non-profit body hosted by Carnegie Mellon University and funded by the US Government that coordinates security response events with industry. The Bluetooth SIG is the specification body for Bluetooth industry, representing over 36,000 member companies [ E4.1]. These bodies in turn coordinated a response among their members.
The KNOB attack in [ R2] was evaluated by Intel as “Critical”, with a score of 9.3 (out of 10) [ E1], which resulted in Intel awarding a Bug Bounty Firmware Payout of USD30,000 [ E1], their maximum firmware payout [ E7]. CERT/CC issued CVE Identifier, CVE-2019-9506, and a Vulnerability Note, VU#918987 [ E2]. The attack was also evaluated at an industry-wide level as “High”, with a score of 8.1 under CVSS v3.0 [ E2]. For context, this score is higher than that for the well-known Spectre vulnerability (5.6, “Medium”), Heartbleed bug (7.5, “High”) or WPA2 KRACK attack (6.8, “Medium”). This score therefore clearly indicated that the attack required a priority response. As documented below, industry acted very quickly to provide fixes, interrupting normal development schedules to ensure that timely mitigations were made available.
The subsequent BIAS attack in [ R3] was issued CVE-2020-10135 by CERT/CC, who released Vulnerability Note VU#647177, and evaluated as 5.4 “Medium” under CVSS v3.0 [ E9]. While this score is lower than for the earlier work, it only addresses the direct effects of the attack and does consider that it further enhances the power of the KNOB attack – a fact explicitly stated in the vulnerability note [ E8] and discussed in the Bluetooth SIG response [ E4.4].
Working together with the researchers and CERT/CC, ICASI subsequently led disclosures to the whole ICASI membership [ E1]. They also coordinated with Apple and Lenovo through ICASI Collaborator NDAs. As ICASI noted of the handling of [ R2]: “the goal of this coordination was for CERT/CC and the Bluetooth SIG to notify as many potentially impacted vendors as possible so that they could develop the appropriate fixes, while minimizing the risk that the vulnerability would be disclosed prior to a fix being available” [ E3].
Industry acted quickly to provide fixes during the coordinated response process. Most major platform vendors released patches immediately following the public disclosure: Microsoft for Windows; Apple for macOS, iOS, and watchOS; Google for Android; Cisco for IP phones and Webex; Huawei for Android phones; and BlackBerry for Android-powered devices [ E5]. Patches were similarly made available for popular Linux distributions such as debian, Red Hat and Ubuntu [ E5]. Intel published a white paper and a statement in response to the disclosure of the research findings, recommending that “in all cases, components participating in a secure Bluetooth connection employ the highest level of encryption possible” [ E6].
On 13 August 2019, the Bluetooth SIG announced that it had “updated the Bluetooth Core Specification to recommend a minimum encryption key length of 7 octets for BR/EDR connections” [ E4.2] as recommended in [ R2]. The SIG “strongly recommends that product developers update existing solutions to enforce” this minimum, and “is also broadly communicating details on this vulnerability and its remedy to our member companies and is encouraging them to rapidly integrate any necessary patches” [ E4.3]. The SIG represents over 36,000 member companies [ E4.1]. CERT/CC also issued an advisory referring Bluetooth host and controller suppliers to the updated specification and instructing downstream vendors to refer to their suppliers for updates [ E2]. Both the Bluetooth SIG’s technical update and CERT/CC’s advisory describe the technical contribution of the paper [ R2].
As described in their Security Notice [ E4.4 & 5], the Bluetooth SIG made further fixes to the standard in direct response to the BIAS attack [ R3]: “to remedy this vulnerability, the Bluetooth SIG is updating the Bluetooth Core Specification to clarify when role switches are permitted, to ensure a role switch in the middle of a secure authentication procedure does not affect the procedure, to require authenticating the peer device in legacy authentication, and to recommend checks for encryption-type to avoid a downgrade of secure connections to legacy encryption. These changes will be introduced into a future specification revision.”
Due to the well-executed disclosure process, the final experience for most users was the seamless deployment of software patches to protect them [ E5]. In the case of the KNOB attack [ R2, R4], by the time the vulnerability information became public – and thus at greater risk of malicious exploitation – mitigations were already widespread. Further, there had been sufficient opportunity for industry to analyse the intricate technical details of the research papers and produce accessible guidance that users could readily act upon [ E3, E4.2–5, E6].
As a fundamentally preventative activity, and while parts of the industry response are still ongoing, it is difficult to precisely quantify the investment in remedying the KNOB and BIAS vulnerabilities – or indeed the economic savings that pre-empting any malicious exploitation has yielded. However, for context, the costs associated with the WPA2 KRACK attack (CVSS v.3.0 score of only 6.8, lower than the KNOB attack’s 8.1) have been placed in the tens of millions of dollars [ E9], while the cost of the Heartbleed bug (CVSS v.3.0 score of 7.5) has been estimated in the hundreds of millions of dollars [ E10]. What is certain is that the researchers’ coordinated disclosure allowed remediation to begin before malicious exploitation could take place, and that the corrections to the Bluetooth Core Specification guarantee that this work [ R2– R4] will continue to have an industry-wide impact in the future, protecting many millions of Bluetooth users from malicious attacks and associated harm.
5. Sources to corroborate the impact
[ E1] Coordinated disclosure emails regarding (1) the KNOB attack and (2) the BIAS attacks.
[ E2] NIST National Vulnerability Database (NVD) entry for KNOB attack: http://tiny.cc/26auiz; Common Vulnerabilities and Exposures (CVE) entry for KNOB attack: http://tiny.cc/uyauiz;
CERT/CC advisory and vulnerability note on the KNOB attack: http://tiny.cc/70qqiz.
[ E3] Statement from ICASI on the Bluetooth BR/EDR Vulnerability, 13 August 2019: https://www.icasi.org/br-edr-encryption-key-bluetooth-vulnerability/.
[ E4] Bluetooth SIG ( https://www.bluetooth.com/):
(1) SIG information and member numbers: https://www.bluetooth.com/about-us/; global market information in Bluetooth Market Update report 2020 (at p. 10): http://tiny.cc/u9v0tz.
(2) Expedited Errata Correction 11838 to the Core Specification.
(3) Security Notice regarding KNOB attack and Technical Update advising about the correction to the Core Specification: http://archive.ph/G1IVz.
(4) Response to BIAS attacks disclosure.
(5) Security Notice regarding BIAS attacks: https://tinyurl.com/y2j3pga5.
[ E5] Patches announced in August 2019 by major platform vendors: Microsoft Windows – http://archive.ph/HaNVs; Apple macOS – http://archive.ph/Bbyb0, iOS – http://archive.ph/YqPvC, watchOS – http://archive.ph/UZ7pb; Google – http://archive.ph/3lpuJ; Cisco – http://archive.ph/6k9ZJ; Huawei – http://archive.ph/1Z1pG; BlackBerry – http://archive.ph/Yzjjf. Linux patches: debian – http://archive.ph/LdNhr; Red Hat – http://archive.ph/Emm4z; Ubuntu – http://archive.ph/jkTzY.
[ E6] Intel Bluetooth Security – Encryption Key Size Recommendation statement and white paper, August 2019: http://archive.ph/ICUk2.
[ E7] Information on Intel bug bounty payments from cybersecurity firm HackerOne: https://hackerone.com/intel. According to a HackerOne report (at p. 3) the average bug bounty payout for a critical vulnerability in 2019 was USD3,384: http://tiny.cc/4uqrsz.
[ E8] NIST NVD entry for the BIAS attack: https://tinyurl.com/y5vku5to; CVE entry for the BIAS attack: https://tinyurl.com/y2uxe9eb ( http://archive.ph/bcEAE); CERT/CC advisory and vulnerability note for BIAS attack: https://tinyurl.com/yxspma5m.
[ E9] ZDNet article discussing WPA2 KRACK and costs: http://archive.ph/ik38B.
[ E10] eWeek article estimating cost of Heartbleed: http://archive.ph/IMt3t.