State of Security and Reliability of Connected Car EcoSystem

Slides:



Advertisements
Similar presentations
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Advertisements

Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Evolving Threats Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE Florida PI License C Forensics & Recovery LLC Florida.
Web Applications Testing By Jamie Rougvie Supported by.
+ Moving Targets: Security and Rapid-Release in Firefox Presented by Carlos Bernal-Cárdenas.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
OBD Technology Update 5/3/2016.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Understanding Threat Models for Embedded Devices Jake Edge LWN.net Embedded Linux Conference Europe October 28, 2010.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Global Worldwide Connected Cars Market “Global Connected Cars Market, By Technology (2G, 3G, 4G, GNSS), By Connectivity (Embedded, Integrated, Tethered),
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Botnets A collection of compromised machines
Pearson Writer.
Total Car Diagnostics ELM327 USB scanner can read numerous car data/parameters that handheld scan tools can't. Combined with powerful OBD software — you'll.
2017 Atlanta RIMS Educational Conference
3 Do you monitor for unauthorized intrusion activity?
Koji Nakao, Dai Arisue NICT, Japan
ETSI Software Reconfiguration Overview
Firmware threat Dhaval Chauhan MIS 534.
Mobile Testing - Bug Report
[Internal Use] for Check Point employees​
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
Technology Overdrive Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car Dr. Barbara L. Ciaramitaro,
Common Methods Used to Commit Computer Crimes
A lustrum of malware network communication: Evolution & insights
Security of In-Vehicle Software
Lesson Objectives To understand environmental, legal and ethical considerations of computing To understand the importance of different types of industry.
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
Kevin C. Chang University of Illinois, Urbana-Champaign
Understanding Threat Models for Embedded Devices
Outline What does the OS protect? Authentication for operating systems
ASSET - Automotive Software cyber SEcuriTy
Control system network security issues and recommendations
Introduction SOFTWARE ENGINEERING.
North Carolina Law Review Symposium
Why it is good for startups to partner with Industry leaders
Outline What does the OS protect? Authentication for operating systems
Botnets A collection of compromised machines
Forensics Week 11.
Pearson Writer.
Software Engineering: A Practitioner’s Approach, 7/e Chapter 2 Prescriptive Process Models copyright © 1996, 2001, 2005 R.S. Pressman & Associates, Inc.
Software Engineering: A Practitioner’s Approach, 7/e Chapter 2 Prescriptive Process Models copyright © 1996, 2001, 2005 R.S. Pressman & Associates, Inc.
Myths About Web Application Security That You Need To Ignore.
Introduction Edited by Enas Naffar using the following textbooks: - A concise introduction to Software Engineering - Software Engineering for students-
Risk of the Internet At Home
Aniket Shah & Alexander Witt
Internet of Things Vulnerabilities
Understanding IDENTITY Assurance
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Information Security Awareness
Welcome To The Project Website
Summary AutoMap™ is an innovative vehicle tracking and reporting system that ensures the vehicle’s location and status. Reduces Cost Removes all routine.
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Chapter 7: Market Structures Section 4
Network and security practices in automotive systems
Developing for Windows Azure
Luxury Images copyrighted to:
Engineering Secure Software
Cyber security and Computer Misuse
CS 188: Artificial Intelligence Spring 2006
Autonomous Network Alerting Systems and Programmable Networks
3 Do you monitor for unauthorized intrusion activity?
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
6. Application Software Security
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

State of Security and Reliability of Connected Car EcoSystem Atul Prakash Department of EECS University of Michigan, Ann Arbor Contact: aprakash@umich.edu

Our Research & Expertise Security of IoT Frameworks Some recent accomplishments: FlowFence: Practical Data Protection for Emerging IoT Application Frameworks USENIX Security, 2016 Analyzed security of Samsung's SmartThings IoT framework and hub-based architecture. IEEE Security and Privacy Distinguished Practical Paper, 2016

Lines of Code in an Automobile Source: Information is beautiful.net Source: Inforamtionisbeautiful.net

Reliability concerns Software is complex. Real-time requirements in many sub-systems. Large body of code implies existence of bugs Increasing attack surface over time Network access, Use of OBD-II port for tasks other than diagnostics

Do bugs have real-world impact? Unquestionably. Ford Sync and Consumer Reports ratings Toyota brake/accelerator issue? Driver death when Tesla was in auto-pilot mode Chrysler recall: remote attack vulnerabilities in 2015

Reliability Challenge Google/Facebook bug vs. bug in an automobile. Criticality? Size of software teams? Open source vs. closed source Where would top software engineering talent go today? Facebook? Auto companies? Why? Bug bounty programs? How do they compare?

A Bay Area company's Bug Bounty program

Auto Companies Bug Bounty Program Great to see them come into existence Awards: Chrysler: $150 to $1500 GM. Hall of Fame. Not sure if there is a reward Ford? Not sure if one exists yet

One auto company: What bugs don't count? Denial of service attacks Report of insecure SSL/TLS ciphers Open ports which do not lead directly to vulnerability Open redirect vulnerabilities Publicly accessible login panels Content spoofing/text injection

Posture towards those reporting bugs A Bay Area company:

Posture towards those reporting bugs One auto company X agrees to not pursue claims against researchers related to the disclosures submitted through this website who: … publicly disclose vulnerability details only after X confirms completed remediation of the vulnerability and not publicly disclose vulnerability details if there is no completion date or completion cannot be ascertained;

Which policy works for researchers? A driving force for top researchers: conference deadlines My own team's experience: Vulnerabilities in SmartThings platform Vulnerabilities on banking web sites At most a few months window for us to hold back public disclosure Auto companies may need to adapt to such a time scale

Are connected cars risky? Remote Exploit of an Unaltered Jeep Cherokee, Black Hat 2014. 2015 demo (Chris Valasek and Charlie Miller) 1.4M vehicle recall of Chrysler Vehicles. Multiple 2013-15 models recalled.

Basics of the Hack WiFi (crack password) -> Head Unit (Linux) Alternative: Cellular network -> Head Unit (Linux) From there, compromised Multimedia System an then the CAN bus.

Was this the earliest attack? No. It just got a lot of attention since the identity of the vehicle was revealed. Similar attack demonstrated earlier by a UCSD-UW team of researchers in 2010-2011 on an unidentified car (at that time) In 2010, at IEEE S&P, they showed that CAN bus is insecure. Physical access to the OBD-II port, for example, allowed full compromise of the car In 2011, at Usenix Security, they showed remote exploits

Attacks on Car Platforms 2010-11 research by UCSD & UW

Key takeaways Can cars be completely compromised if attackers get access to the CAN bus? Yes. ECUs can be reprogrammed with new firmware, commands can be injected to control actuators and devices or to control ECUs. Also, backup safety systems can be blocked from communicating

Response time for security fixes For 2010-11 attack, according to a Wired article, it was a GM Impala vehicle. Researchers shared the attack details with GM, but not with the public (nor the identity of the vehicle). It took GM approximately 5 years to fix. For 2015 attack, identity of the vehicle was made public. It led to a quick recall and fix by Chrysler.

Lesson? Reveal Did revealing the identity of the vehicle have to do with a quicker response? Or differences in car companies? More likely that the auto industry were not ready to handle security issues in 2010, but is now much better According to UW-UCSD researchers, it would have been a bad idea to reveal the car's identity in 2010-11, given the nascent state of automobile security at the time

How fundamental are the problems? CAN bus: 30-year old design. No security features. All bets off once a hacker accesses the CAN bus via any component on the bus or via the OBD port Retrofitting security in the standard likely hard or impossible (though companies are trying) Likely: CAN bus needs to be replaced by a more secure standard

What about "air gap"? Car companies try to isolate infotainment systems from safety-critical systems. In practice, air gap is often not a true air gap. Shared components can breach the gap In exploited Jeep, the Multimedia Unit was not directly on the CAN bus. Nevertheless, attackers were able to get on the CAN bus

OBD-II port Law since 1996 requires a standard diagnostic port for mechanics. Directly on the CAN bus Multiple of devices available that plug into the port, some with apps.

Are security problems still there? Yes! Fundamentally, they never went away They continue to be discovered. Same 2014 Jeep was attacked again at BlackHat 2016 via a different attack vector Sevearl papers at IEEE Security and Privacy 2016 and Usenix Security Symposium 2016 on automotive security

Are attackers incentivized to exploit them? Jury is out, but history on other platforms suggests Yes. Ransomware, creating nuisance, eavesdropping and privacy leaks, and targeted attacks: all theoretically possible State actors should not be ruled out

What can car companies do? Emulate software companies like Google, Facebook, Apple, and Microsoft Work closely with academic security researchers. Car communication infrastructure needs re-think. Be more open. Security by obscurity usually does not work Assume that motivated hackers will eventually be there as connected cars become more popular and share software components. Some predictions: Ransomware to allow car use We will be getting weekly or monthly software upgrades