Security enhancing CAN transceivers Bernd Elend Principal Engineer - - PowerPoint PPT Presentation

security enhancing can transceivers
SMART_READER_LITE
LIVE PREVIEW

Security enhancing CAN transceivers Bernd Elend Principal Engineer - - PowerPoint PPT Presentation

Security enhancing CAN transceivers Bernd Elend Principal Engineer March 8 th , 2017 Introduction: SECURITY REQUIRES A LAYERED APPROACH NXPs 4 + 1 Layer approach for vehicle cyber security: Multiple security techniques, at different


slide-1
SLIDE 1

Bernd Elend Principal Engineer March 8th , 2017

Security enhancing CAN transceivers

slide-2
SLIDE 2

Introduction: SECURITY REQUIRES A LAYERED APPROACH

1 2 3 4

  • Multiple security techniques, at different

levels (“defense-in-depth”)

  • Mitigate the risk of one component of the

defense being compromised or circumvented NXP’s “4 + 1 Layer approach” for vehicle cyber security:

slide-3
SLIDE 3

Security enhancing CAN transceivers How can a CAN transceiver contribute to the cyber security of a vehicle?

slide-4
SLIDE 4

In a CAN network node A wants to send data to node B

Security enhancing CAN transceivers

4.

Node A Node B

slide-5
SLIDE 5

Node A Node B Node E Node C Node D Node F Node G Node H

… and also other nodes are present

Security enhancing CAN transceivers

5.

slide-6
SLIDE 6

Node A Node B Node E

… let us focus only on A, B and E for simplicity

Security enhancing CAN transceivers

6.

slide-7
SLIDE 7

Node A Node B Node E

USB

… and see what kind of other connections E might have

Security enhancing CAN transceivers

7.

slide-8
SLIDE 8

Node A Node B Node E

USB

… all of them do offer an attack surface

Security enhancing CAN transceivers

8.

Attack surface

slide-9
SLIDE 9

Node A Node B Node E

… finally the hacker succeeds to overcome the security measures

Security enhancing CAN transceivers

9.

slide-10
SLIDE 10

Node A Node B Node E

… node E now pretends to be node A

Security enhancing CAN transceivers

10. ID = 0x123 ID = 0x123

Spoofing attack !

slide-11
SLIDE 11

Security enhancing CAN transceivers

11.

Node B is now in a dilemma. Which message is the correct one? Both have the same CAN ID, but different data. B does not know who the sender of which message is.

slide-12
SLIDE 12

Security enhancing CAN transceivers

12.

1st Solution: Transmission whitelist The transceiver of Node E allows to send only CAN or CAN FD messages with an ID that is stored in a whitelist in the transceiver. Implications: The message occurs once the bus, and is invalidated in the end-of-frame

  • field. After that node E is excluded by

the transceiver from any further communication. Benefits: Only one error flag on the bus. This method can also be used to protect against flooding attacks that would lead to a denial of service, by limiting the transmitted bus load. Drawback: Does not help in case node E is not under control of the OEM; e.g. after market device.

slide-13
SLIDE 13

Security enhancing CAN transceivers

13.

2nd Solution: Spoofing protection The transceiver of Node A sends an active error flag, when it receives an identifier that it usually would sent. Error flag Implications: The error flag send by node A causes 16 repetitions before node E enters “error passive” (with suspend trans- mission) and further 16 repetitions prior to entering “bus off” state. Benefits: Helps to protect in case of foreign node attachment; i.e. in case E is not under control of the OEM like aftermarket devices. Drawbacks: Does not work, if A is not present

(e.g. like an off-board tester) or node A

is in Sleep mode or un-powered. Node E can be re-started by the hacker at any time. This method also helps in case Node E starts tampering the message data, after A has sent the identifier and when node A is in “error passive” state. 32 error frames and peak busload do occur.

slide-14
SLIDE 14

Features in transmit path: Transmission whitelisting Flooding prevention

Security enhancing CAN transceivers

14.

Features in receive path: Spoofing protection Tamper protection Error flag

Independent operation from a possibly compromised host ! Intrusion detection Intrusion prevention

slide-15
SLIDE 15

Security enhancing CAN transceivers

15.

Features in receive path: Spoofing protection Tamper protection Error flag Features in transmit path: Transmission whitelisting Flooding prevention List of IDs for spoofing protection and transmission whitelist can be the same ! does not need configuration needs limit, e.g. 6% bus load needs list of identifiers needs list of identifiers

Configuration is done at Tier-1:  program  test  lock

No update in the field possible attack

slide-16
SLIDE 16

CAN Transceiver

FULL 5 MBps PORTFOLIO

Security enhancing CAN transceivers

Ultra-low Emission, Ultra-low Power, 5 Mbps CAN cell

Spoofing & Tampering protection TX control & Flooding protection  Basic access prevention CAN/ CAN FD NETWORK SECURITY

Set of policies stored in memory

How to get to such a security enhancing transceiver?

CAN FD BUS MONITOR  FD SHIELD RE-USE CAN ECUs IN CAN FD NETWORKS

CAN FD controller

CAN BUS MONITOR  PARTIAL NETWORKING

ENERGY SAVING, FAST ECU FLASHING

CAN decoder

16.

 ECU and Network Security

slide-17
SLIDE 17

CAN Transceiver

HW Crypto Accelerators Programmable Core Secure Storage

Security enhancing CAN transceivers

Ultra-low Emission, Ultra-low Power, 5 Mbps CAN cell

What could be next ?

CAN FD BUS MONITOR  FD SHIELD RE-USE CAN ECUs IN CAN FD NETWORKS

CAN FD controller

CAN BUS MONITOR  PARTIAL NETWORKING

ENERGY SAVING, FAST ECU FLASHING

CAN decoder

17.

Security In built CAN PHY  ECU and Network Security CAN/ CAN FD NETWORK SECURITY FULL 5 MBps PORTFOLIO

slide-18
SLIDE 18

Security enhancing CAN transceivers

18.

Feature summary:

  • 1. Spoofing protection

transceiver may issue an active error flag on reception of a CAN ID that is included in its transmission whitelist

  • 2. Transmission whitelisting

the sending transceiver has a transmission whitelist of CAN IDs that are allowed to be sent

  • 3. Tamper protection

If the node starts a transmission and a compromised node tampers the message, while the sender is error passive, then the transceiver is preventing message take over by sending an active error flag

  • 4. Flooding prevention

The transceiver ensures that the contribution to the bus load is limited Advantages to realize these features in a transceiver:

  • 1. Drop-in replacement transceiver for standard transceivers, no other HW change
  • 2. Quick fix for vulnerable modules, no host SW update necessary
  • 3. No cryptography included, no key management necessary
  • 4. Independent from host µC, physically isolated
  • 5. Complementary to other security measures
slide-19
SLIDE 19