Security enhancing CAN transceivers Bernd Elend Principal Engineer - - PowerPoint PPT Presentation
Security enhancing CAN transceivers Bernd Elend Principal Engineer - - PowerPoint PPT Presentation
Security enhancing CAN transceivers Bernd Elend Principal Engineer March 8 th , 2017 Introduction: SECURITY REQUIRES A LAYERED APPROACH NXPs 4 + 1 Layer approach for vehicle cyber security: Multiple security techniques, at different
Introduction: SECURITY REQUIRES A LAYERED APPROACH
1 2 3 4
- Multiple security techniques, at different
levels (“defense-in-depth”)
- Mitigate the risk of one component of the
defense being compromised or circumvented NXP’s “4 + 1 Layer approach” for vehicle cyber security:
Security enhancing CAN transceivers How can a CAN transceiver contribute to the cyber security of a vehicle?
In a CAN network node A wants to send data to node B
Security enhancing CAN transceivers
4.
Node A Node B
Node A Node B Node E Node C Node D Node F Node G Node H
… and also other nodes are present
Security enhancing CAN transceivers
5.
Node A Node B Node E
… let us focus only on A, B and E for simplicity
Security enhancing CAN transceivers
6.
Node A Node B Node E
USB
… and see what kind of other connections E might have
Security enhancing CAN transceivers
7.
Node A Node B Node E
USB
… all of them do offer an attack surface
Security enhancing CAN transceivers
8.
Attack surface
Node A Node B Node E
… finally the hacker succeeds to overcome the security measures
Security enhancing CAN transceivers
9.
Node A Node B Node E
… node E now pretends to be node A
Security enhancing CAN transceivers
10. ID = 0x123 ID = 0x123
Spoofing attack !
Security enhancing CAN transceivers
11.
Node B is now in a dilemma. Which message is the correct one? Both have the same CAN ID, but different data. B does not know who the sender of which message is.
Security enhancing CAN transceivers
12.
1st Solution: Transmission whitelist The transceiver of Node E allows to send only CAN or CAN FD messages with an ID that is stored in a whitelist in the transceiver. Implications: The message occurs once the bus, and is invalidated in the end-of-frame
- field. After that node E is excluded by
the transceiver from any further communication. Benefits: Only one error flag on the bus. This method can also be used to protect against flooding attacks that would lead to a denial of service, by limiting the transmitted bus load. Drawback: Does not help in case node E is not under control of the OEM; e.g. after market device.
Security enhancing CAN transceivers
13.
2nd Solution: Spoofing protection The transceiver of Node A sends an active error flag, when it receives an identifier that it usually would sent. Error flag Implications: The error flag send by node A causes 16 repetitions before node E enters “error passive” (with suspend trans- mission) and further 16 repetitions prior to entering “bus off” state. Benefits: Helps to protect in case of foreign node attachment; i.e. in case E is not under control of the OEM like aftermarket devices. Drawbacks: Does not work, if A is not present
(e.g. like an off-board tester) or node A
is in Sleep mode or un-powered. Node E can be re-started by the hacker at any time. This method also helps in case Node E starts tampering the message data, after A has sent the identifier and when node A is in “error passive” state. 32 error frames and peak busload do occur.
Features in transmit path: Transmission whitelisting Flooding prevention
Security enhancing CAN transceivers
14.
Features in receive path: Spoofing protection Tamper protection Error flag
Independent operation from a possibly compromised host ! Intrusion detection Intrusion prevention
Security enhancing CAN transceivers
15.
Features in receive path: Spoofing protection Tamper protection Error flag Features in transmit path: Transmission whitelisting Flooding prevention List of IDs for spoofing protection and transmission whitelist can be the same ! does not need configuration needs limit, e.g. 6% bus load needs list of identifiers needs list of identifiers
Configuration is done at Tier-1: program test lock
No update in the field possible attack
CAN Transceiver
FULL 5 MBps PORTFOLIO
Security enhancing CAN transceivers
Ultra-low Emission, Ultra-low Power, 5 Mbps CAN cell
Spoofing & Tampering protection TX control & Flooding protection Basic access prevention CAN/ CAN FD NETWORK SECURITY
Set of policies stored in memory
How to get to such a security enhancing transceiver?
CAN FD BUS MONITOR FD SHIELD RE-USE CAN ECUs IN CAN FD NETWORKS
CAN FD controller
CAN BUS MONITOR PARTIAL NETWORKING
ENERGY SAVING, FAST ECU FLASHING
CAN decoder
16.
ECU and Network Security
CAN Transceiver
HW Crypto Accelerators Programmable Core Secure Storage
Security enhancing CAN transceivers
Ultra-low Emission, Ultra-low Power, 5 Mbps CAN cell
What could be next ?
CAN FD BUS MONITOR FD SHIELD RE-USE CAN ECUs IN CAN FD NETWORKS
CAN FD controller
CAN BUS MONITOR PARTIAL NETWORKING
ENERGY SAVING, FAST ECU FLASHING
CAN decoder
17.
Security In built CAN PHY ECU and Network Security CAN/ CAN FD NETWORK SECURITY FULL 5 MBps PORTFOLIO
Security enhancing CAN transceivers
18.
Feature summary:
- 1. Spoofing protection
transceiver may issue an active error flag on reception of a CAN ID that is included in its transmission whitelist
- 2. Transmission whitelisting
the sending transceiver has a transmission whitelist of CAN IDs that are allowed to be sent
- 3. Tamper protection
If the node starts a transmission and a compromised node tampers the message, while the sender is error passive, then the transceiver is preventing message take over by sending an active error flag
- 4. Flooding prevention
The transceiver ensures that the contribution to the bus load is limited Advantages to realize these features in a transceiver:
- 1. Drop-in replacement transceiver for standard transceivers, no other HW change
- 2. Quick fix for vulnerable modules, no host SW update necessary
- 3. No cryptography included, no key management necessary
- 4. Independent from host µC, physically isolated
- 5. Complementary to other security measures