automobile intrusion detection
play

Automobile Intrusion Detection Jun Li Twitter @bravo_fighter - PowerPoint PPT Presentation

Automobile Intrusion Detection Jun Li Twitter @bravo_fighter UnicornTeam Qihoo360 2 What this talk is about? Automotive intrusion detection Automotive cyber-security architecture From the highest viewpoint J 3 Outline Quick


  1. Automobile Intrusion Detection Jun Li Twitter : @bravo_fighter UnicornTeam Qihoo360

  2. 2� What this talk is about? Automotive intrusion detection Automotive cyber-security architecture

  3. From the highest viewpoint J 3�

  4. Outline • Quick recap of the status quo of car security research • Little automobile working principle • CAN bus anomaly detection

  5. Car hacking development Remote GM Onstar attack Vuln,Sammy Immobilizer BMW More to via wireless Cracking ConnectedDrive come ? OBD ( Hitag , vuln Sure ! interface Keeloq ) Telsa DARPA&UW Mbrace Performance Jeep Uconnect Qihoo360 OBD Tuning by Charlie&Chris interface modifying attack , etc. firmware Karl et al.

  6. Car explained

  7. Sensor security

  8. ECU (Electronic Control Unit) In automotive electronics, Electronic Control Unit ( ECU ) is a generic term for any secret system that controls one or more of the electrical system or subsystems in a transport vehicle Types of ECU include Electronic/engine Control Module (ECM), Powertrain Control Module (PCM), Transmission Control Module (TCM), Brake Control Module (BCM or EBCM), Central Control Module (CCM), Central Timing Module (CTM), General Electronic Module (GEM), Body Control Module (BCM), Suspension Control Module (SCM), control unit, or control module

  9. 9� Electronic Control Module Example

  10. 10� Automotive Mechatronics

  11. 11� Drive-by-wire system hackable Non-hackable Throttle position sensor

  12. 12� Steering-by-wire system Steer-by –wire ( with mechanical fallback clutch ) Universal joint

  13. Automotive Control System Architecture

  14. Vehicle CAN BUS System

  15. Vehicle Communication System Infotainment OBDII System MOST LIN CAN FlexRay Bluetooth Wifi SubGHz

  16. Vehicle Communication System example Music Player Speedometer INS ESP ( electronic stability program ) Infotainment EMU ( engine management System 网关 system ) TCU ( transmission control unit ) CAN-C ESP TCU ACC … ACC ( adaptive cruise EMU control ) INS ( Inertial navigation system ) CAN-B Seat Controller

  17. CAN BUS Signaling

  18. CAN Frame Structure

  19. CAN Bus Access Arbitration 0 dominant 1 recessive 1 0 0 1 0 1 0 1 1 1 1 0 0 1 0 1 1 0 0 1 0

  20. CAN BUS Attack Packets injection Parameter spoofing

  21. Remote Attack Example Jeep Uconnect Vulnerability femotocell WiFi Sprint Internet CAN

  22. Automotive intrusion detection researches

  23. Automotive intrusion detection researches Not considering Temporal feature

  24. Distributed architecture

  25. CAN 总线 安全防御模型 IDS IDS ( Intrusion Detection System )

  26. Difficulties of CAN bus defence ① Real time requirements� ② Hard to trace back to sender� ③ High cost of false positive� ④ … �

  27. CAN Anomaly Detection McAfee&Intel

  28. CAN bus defence IDS

  29. CAN security architecture Bluetooth WiFi Cellular V2X IDS

  30. Experiment Car • Hybrid • Electronic Brake • Electric Power Steering • Electronic Throttle • Cellular Connection • Cloud Service • Bluetooth Key

  31. Experiment car’s CAN network

  32. The CAN database

  33. Why don’t we build a model Take the relation ship of rpm and speed , gear for example , we can create a model of the System‘s behavior

  34. 汽 车 工作原理

  35. Anomaly detection system Parameter Cross extraction Prediction Realtime data stream

  36. System model requirements Gear

  37. Build the system model Data Data Feature Data Model analysis preprocess Selection Collection Training &Testing

  38. Data Acquisition Parameter presence on different BUS Engine Acceleration Intake Brake Steering Parameter Speed Gear RPM Pedal Pressure Pedal Wheel o o x x o o o Instrument o o x x o x x Comfort BUS o o o o o x x Power o o o o o x o ECM o o o x o o o ESC

  39. Data Acquisition Setup

  40. Data Analysis Can database is kept highly confidential

  41. Data Preprocess

  42. Data Preprocess Normalization Interpolation Sampling

  43. Normalization Must make sure the maximum and minimum value , don’t calculate from the training data

  44. 数据插 值 Observation Interpolation

  45. Sub-Sampling

  46. Sub-Sampling Time_ ms � AccPeda RPM � Speed � MAP � MAF � Throttle � l � 13897 0.287983 0.134259 0.059055 0.167567 0.697107 0.137795 3 � 8 � 2 � 1 � 5 � 0 � 2 � 13897 0.287312 0.134259 0.055118 0.167567 0.697107 0.137795 4 � 5 � 2 � 1 � 5 � 0 � 2 � 13897 0.287312 0.134259 0.051181 0.167567 0.697107 0.137795 5 � 5 � 2 � 1 � 5 � 0 � 2 � 13897 0.285970 � 0.134259 0.047244 0.167567 0.697107 0.137795 6 � 2 � 0 � 5 � 0 � 2 � 13897 0.285970 � 0.134259 � 0.051181 0.167567 0.697107 0.137795 7 � 1 � 5 � 0 � 2 �

  47. Sub-Sampling

  48. Model training

  49. Model training

  50. Results

  51. Result

  52. Model testing

  53. Model testing

  54. Acknowledgement Professor Shuicheng Yan Doctor Ming Lin Doctor Zhanyi Wang Doctor Lin Huang

  55. Thank You ! Q&A

  56. Reference

  57. 1. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy , Brian Kantor, Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011. 3. Charlie Miller , Chris Valasek , Adventures in Automotive Networks and Control Units , 2013. 4. Charlie Miller , Chris Valasek , Remote Exploitation of an Unaltered Passenger Vehicle , 2015 5. Dieter Spaar , Sicherheitslücken bei BMWs ConnectedDrive/ Beemer, Open Thyself! – Security vulnerabilities in BMW's ConnectedDrive,2015. 6. Iamthecarvalry.org , Five Star Automotive Cyber Safety Framework , 2015. 7. Pierre Kleberger , Security Aspects of the In-Vehicle Network in the Connected Car , IEEE Intelligent Vehicles Symposium , 2011 8. Marc Rogers , Kevin Mahaffey , How to Hack a Tesla Model S , DEF CON 23,2015 9. Charlie Miller Chris Valasek , Advanced CAN Injection Techniques for Vehicle Networks , BlackhatUSA , 2016 10. Kyong-Tak Cho and Kang G. Shin, Fingerprinting Electronic Control Units for Vehicle Intrusion Detection, 2016

  58. 11. Nobuyasu Kanekawa,X-by-Wire Systems,Hitachi Research Lab.2011 12. Paul Yih, Steer-by-Wire: Implication For Vehicle Handling and Safety , Stanford PHD Dissertation , 2005 13. Luigi Coppolion , Dependability aspects of automotive x-by-wire technologies , 2008. 14. Jonas Zaddach,Andrei Costin,Embedded Devices Security and Firmware Reverse Engineering , Blackhat Workshop,2013. 15. Andrei costin , Jonas Zaddach , A large-Scale Analysis of the Security of Embedded Firmwares , EURECOM , 2014. 16. Samy Kamkar , Drive It Like You hacked It , DEF CON23 , 2015 17. David A Brown, Geoffrey Cooper, Automotive Security Best Practices, White Paper by Intel & McAfee,2014. 18. OpenGarages, Car Hacker’s Handbook , openGarage.org,2014. 19. Henning Olsson, OptimumG , Vehicle Data Acquisition Using CAN,2010 20. Varun Chandola , Arindam Banerjee , Vipin Kumar , Anomaly Detection : A Survey , 2009

  59. 21. Park, Ming Kuang, Neural learning of driving environment prediction for vehicle power management, Joint Conf. on Neural Networks, 2008. 22. Taylor, P., Adamu-Fika, F., Anand, S., Dunoyer, A., Griffiths, N., and Popham, T. Road type classification through data mining , 2012. 23. Michael Muter, Naim Asaj , Entropy-based anomaly detection for in-vehicle networks", IEEE Intelligent Vehicles Symposium (IV), 2011. 24. Ulf E. Larson, Dennis K. Nilsson,An Approach to Specification-based Attack Detection for In-Vehicle Networks, IEEE Intelligent Vehicles Symposium,2008. 25. Y. L. Murphey, Zhi Hang Chen, L. Kiliaris, Jungme ,I. Tang and T. P. Breckon, Automatic road environment classication, IEEE Trans. on Intelligent Transportation Systems, 2011. 26. Salima Omar, Asri Ngadi, Hamid H.Jebur, Machine Learning Techniques for Anomaly Detection: An Overview. 27. Perter Harrington , Machine Learning In Action , 2013. 28. Jurgen Schmidhuber , Deep learning in neural networks: An overview , 2015. 29. Kaiserslautern , Comparison of Unsupervised Anomaly Detection Techniques , German Research Center for Artificial Intelligence, 2011

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend