Survey on Security Threats and Protection Mechanisms in Embedded - - PowerPoint PPT Presentation

survey on security threats and protection mechanisms in
SMART_READER_LITE
LIVE PREVIEW

Survey on Security Threats and Protection Mechanisms in Embedded - - PowerPoint PPT Presentation

The Automotive Network Threats Protection mechanisms Conclusion Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia Vincent Nicomette Eric Alata Yves Deswarte Mohamed Ka aniche Renault


slide-1
SLIDE 1

The Automotive Network Threats Protection mechanisms Conclusion

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks

Ivan Studnia Vincent Nicomette ´ Eric Alata Yves Deswarte Mohamed Kaˆ aniche

Renault S.A.S LAAS-CNRS Dependable Computing and Fault Tolerance team

June 24, 2013

Ivan Studnia Security of embedded automotive networks survey 1/19

slide-2
SLIDE 2

The Automotive Network Threats Protection mechanisms Conclusion

1

The Automotive Network

2

Threats

3

Protection mechanisms

4

Conclusion

Ivan Studnia Security of embedded automotive networks survey 2/19

slide-3
SLIDE 3

The Automotive Network Threats Protection mechanisms Conclusion

1

The Automotive Network

2

Threats

3

Protection mechanisms

4

Conclusion

Ivan Studnia Security of embedded automotive networks survey 3/19

slide-4
SLIDE 4

The Automotive Network Threats Protection mechanisms Conclusion

Embedded networks

Modern cars embed An internal network. . .

Between 30 and 70 ECUs Several communication protocols: CAN, LIN, MOST, FlexRay. . .

Source: [Checkoway et al., 2011] Ivan Studnia Security of embedded automotive networks survey 4/19

slide-5
SLIDE 5

The Automotive Network Threats Protection mechanisms Conclusion

Embedded networks

Modern cars embed An internal network. . .

Between 30 and 70 ECUs Several communication protocols: CAN, LIN, MOST, FlexRay. . .

. . . with external connections

On Board Diagnostic (OBD) port USB port Bluetooth WiFi GSM 3G/4G Car2Car

Source: [Checkoway et al., 2011] Ivan Studnia Security of embedded automotive networks survey 4/19

slide-6
SLIDE 6

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-7
SLIDE 7

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Security properties Integrity ? Confidentiality ? Availability ? Authenticity ?

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-8
SLIDE 8

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Security properties Integrity ? Confidentiality ? Availability ? Authenticity ? → Just a CRC

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-9
SLIDE 9

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Security properties Integrity ? Confidentiality ? Availability ? Authenticity ? → Just a CRC → Broadcast only

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-10
SLIDE 10

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Security properties Integrity ? Confidentiality ? Availability ? Authenticity ? → Just a CRC → Broadcast only → Easy DOS

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-11
SLIDE 11

The Automotive Network Threats Protection mechanisms Conclusion

CAN & Security

SOF Identifier Control Data CRC ACK EOF 1 bit 12/30 bits 6 bits 0 - 64 bits 16 bits 2 bits 7 bits Content of a CAN frame

Security properties Integrity ? Confidentiality ? Availability ? Authenticity ? → Just a CRC → Broadcast only → Easy DOS → No authentication

Ivan Studnia Security of embedded automotive networks survey 5/19

slide-12
SLIDE 12

The Automotive Network Threats Protection mechanisms Conclusion

1

The Automotive Network

2

Threats

3

Protection mechanisms

4

Conclusion

Ivan Studnia Security of embedded automotive networks survey 6/19

slide-13
SLIDE 13

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-14
SLIDE 14

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-15
SLIDE 15

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge Theft

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-16
SLIDE 16

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge Theft Tuning

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-17
SLIDE 17

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge Theft Tuning Sabotage

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-18
SLIDE 18

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge Theft Tuning Sabotage IP theft

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-19
SLIDE 19

The Automotive Network Threats Protection mechanisms Conclusion

Attack goals

Challenge Theft Tuning Sabotage IP theft Privacy breach

Ivan Studnia Security of embedded automotive networks survey 7/19

slide-20
SLIDE 20

The Automotive Network Threats Protection mechanisms Conclusion

Local attacks

Direct access to the bus Additional device plugged in Through the OBD port

Ivan Studnia Security of embedded automotive networks survey 8/19

slide-21
SLIDE 21

The Automotive Network Threats Protection mechanisms Conclusion

Local attacks

Direct access to the bus Additional device plugged in Through the OBD port Results Many documented attacks Impersonation, reflashing, ”virus”. . . Up to complete takeover

Source: [Koscher et al., 2010] Ivan Studnia Security of embedded automotive networks survey 8/19

slide-22
SLIDE 22

The Automotive Network Threats Protection mechanisms Conclusion

Remote attacks

[Rouf et al., 2010] Target: Tire Pressure Monitoring System Eavesdropping from up to 40m Spoofed messages sent to monitoring ECU [Francillon et al., 2010] Target: Passive Keyless Entry and Start Relay attack Car unlocked and started 50m away from the owner

Ivan Studnia Security of embedded automotive networks survey 9/19

slide-23
SLIDE 23

The Automotive Network Threats Protection mechanisms Conclusion

Remote/Indirect takeover

[Checkoway et al., 2011] Vulnerabilities found in Physical indirect range: CD player, OBD plug-in device, infected smartphone. . . Short wireless range: Bluetooth Long range: GSM/3G unit One communication device compromised → Complete takeover of the car

Ivan Studnia Security of embedded automotive networks survey 10/19

slide-24
SLIDE 24

The Automotive Network Threats Protection mechanisms Conclusion

1

The Automotive Network

2

Threats

3

Protection mechanisms

4

Conclusion

Ivan Studnia Security of embedded automotive networks survey 11/19

slide-25
SLIDE 25

The Automotive Network Threats Protection mechanisms Conclusion

A major concern

Ivan Studnia Security of embedded automotive networks survey 12/19

slide-26
SLIDE 26

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-27
SLIDE 27

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations Real Time

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-28
SLIDE 28

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations Real Time Autonomy: (almost) no interaction required

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-29
SLIDE 29

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations Real Time Autonomy: (almost) no interaction required Lifecycle: 20 years

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-30
SLIDE 30

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations Real Time Autonomy: (almost) no interaction required Lifecycle: 20 years Compatibility: retrocompatibility and interoperability

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-31
SLIDE 31

The Automotive Network Threats Protection mechanisms Conclusion

Constraints

Hardware limitations Real Time Autonomy: (almost) no interaction required Lifecycle: 20 years Compatibility: retrocompatibility and interoperability Physical constraints

Ivan Studnia Security of embedded automotive networks survey 13/19

slide-32
SLIDE 32

The Automotive Network Threats Protection mechanisms Conclusion

Protections (1/2)

Cryptography Authentication, integrity checks, encryption Dedicated hardware for cryptography [Wolf and Gendrullis, 2012]

Ivan Studnia Security of embedded automotive networks survey 14/19

slide-33
SLIDE 33

The Automotive Network Threats Protection mechanisms Conclusion

Protections (1/2)

Cryptography Authentication, integrity checks, encryption Dedicated hardware for cryptography [Wolf and Gendrullis, 2012] Software integrity Secure boot Virtualization [Groll et al., 2009]

Ivan Studnia Security of embedded automotive networks survey 14/19

slide-34
SLIDE 34

The Automotive Network Threats Protection mechanisms Conclusion

Protections (2/2)

Intrusion detection Anomaly-based

Tainting tool [Schweppe and Roudier, 2012] Restricted headers & self-checking [Matsumoto et al., 2012] Entropy variations [Muter and Asaj, 2011]

Signature-based IDS [Muter et al., 2010]

Ivan Studnia Security of embedded automotive networks survey 15/19

slide-35
SLIDE 35

The Automotive Network Threats Protection mechanisms Conclusion

Protections (2/2)

Intrusion detection Anomaly-based

Detects unknown attacks Requires a very thorough model

Signature-based

Very few false positives Regular updates required

Ivan Studnia Security of embedded automotive networks survey 15/19

slide-36
SLIDE 36

The Automotive Network Threats Protection mechanisms Conclusion

1

The Automotive Network

2

Threats

3

Protection mechanisms

4

Conclusion

Ivan Studnia Security of embedded automotive networks survey 16/19

slide-37
SLIDE 37

The Automotive Network Threats Protection mechanisms Conclusion

Conclusion

Threats Lack of security mechanisms in current automotive networks More exposure with wireless communication capacities Several documented attacks

Ivan Studnia Security of embedded automotive networks survey 17/19

slide-38
SLIDE 38

The Automotive Network Threats Protection mechanisms Conclusion

Conclusion

Threats Lack of security mechanisms in current automotive networks More exposure with wireless communication capacities Several documented attacks Trends A key issue for manufacturers Security enforcement

Cryptography Software integrity Anomaly detection

Ivan Studnia Security of embedded automotive networks survey 17/19

slide-39
SLIDE 39

The Automotive Network Threats Protection mechanisms Conclusion

References I

[Checkoway et al., 2011] Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proc. 20th USENIX Security, San Francisco, CA. [Francillon et al., 2010] Francillon, A., Danev, B., and Capkun, S. (2010). Relay attacks on passive keyless entry and start systems in modern cars. IACR ePrint Report, 2010/332. [Groll et al., 2009] Groll, A., Holle, J., Ruland, C., Wolf, M., Wollinger, T., and Zweers, F. (2009). Oversee a secure and open communication and runtime platform for innovative automotive applications. In 7th Embedded Security in Cars Conf. (ESCAR), D¨ usseldorf, Germany. [Koscher et al., 2010] Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., and Shacham, H. (2010). Experimental security analysis of a modern automobile. In 2010 IEEE Symp. Security and Privacy, pages 447–462, Oakland, CA. [Matsumoto et al., 2012] Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., and Oishi, K. (2012). A method of preventing unauthorized data transmission in controller area network. In Vehicular Technology Conf. (VTC Spring), pages 1–5, Yokohama, Japan. IEEE. [Muter and Asaj, 2011] Muter, M. and Asaj, N. (2011). Entropy-based anomaly detection for in-vehicle networks. In Intelligent Vehicles Symposium (IV), pages 1110–1115, Baden Baden, Germany. IEEE. Ivan Studnia Security of embedded automotive networks survey 18/19

slide-40
SLIDE 40

The Automotive Network Threats Protection mechanisms Conclusion

References II

[Muter et al., 2010] Muter, M., Groll, A., and Freiling, F. C. (2010). A structured approach to anomaly detection for in-vehicle networks. In 6th Int. Conf. Information Assurance and Security (IAS), pages 92–98, Atlanta, GA. IEEE. [Rouf et al., 2010] Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., and Seskar, I. (2010). Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proc. USENIX Security Symposium, pages 323–338, Washington, DC. [Schweppe and Roudier, 2012] Schweppe, H. and Roudier, Y. (2012). Security and privacy for in-vehicle networks. In Vehicular Communications, Sensing, and Computing (VCSC), pages 12–17, Seoul, Korea. IEEE. [Wolf and Gendrullis, 2012] Wolf, M. and Gendrullis, T. (2012). Design, implementation, and evaluation of a vehicular hardware security module. Information Security and Cryptology-ICISC 2011, pages 302–318. Ivan Studnia Security of embedded automotive networks survey 19/19