Experimental Security Analysis of a Modern Automobile

Slides:



Advertisements
Similar presentations
The Fully Networked Car Geneva, 3-4 March DEVELOPMENT OF OPEN-CORE FLEXRAY CONTROLLER FOR OEM ULTRA LOW COST AUTOMOTIVE APPLICATIONS PRAMOD.VSUBRAT.
Advertisements

A new Network Concept for transporting and storing digital video…………
Elements of a Microprocessor system Central processing unit. This performs the arithmetic and logical operations, such as add/subtract, multiply/divide,
Car Hacking Patrick, James, Penny.
Comprehensive Experimental Analyses of Automotive Attack Surfaces Authors: Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Car Operating Systems Ryan Benesky. The Beginning of Car Computers 1970s Was the beginning of the EPA and regulations to clean up the environment. In.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Department of Electrical and Computer Engineering Texas A&M University College Station, TX Abstract 4-Level Elevator Controller Lessons Learned.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
COEN 252: Computer Forensics Router Investigation.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SERIAL BUS COMMUNICATION PROTOCOLS
Caleb Walter. iPhone style charger Malware channel Exploit Vehicle CAN network Create Covert Channel at Public Charging Stations Custom Arduino CAN EVSE.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Introduction to USB Development. USB Development Introduction Technical Overview USB in Embedded Systems Recent Developments Extensions to USB USB as.
Developing PC-Based Automobile Diagnostic System Based on OBD System Authors : Hu Jie, Yan Fuwu, Tian Jing, Wang Pan, Cao Kai School of Automotive Engineer.
Input/OUTPUT [I/O Module structure].
Common Devices Used In Computer Networks
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
SHANTILAL SHAH ENGINEERING COLLEGE ,BHAVNAGAR
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Advanced Embedded Systems Design Lecture 13 RISC-CISC BAE Fall 2004 Instructor: Marvin Stone Biosystems and Agricultural Engineering Oklahoma.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
F Networked Embedded Applications and Technologies Lab Department of Computer Science and Information Engineering National Cheng Kung University, TAIWAN.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
© Siemens AG, 2002 s CP RS Agenda The Role of IT for Accident-free Driving Interaction with driver’s physical condition Interaction with the roadside environment.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
C AR MA: Towards Personalized Automotive Tuning Tobias Flach 1, Nilesh Mishra 1, Luis Pedrosa 1, Christopher Riesz 2, Ramesh Govindan 1 1 University of.
 Introduction  What is Driverless Car ?  History  Component  Action  Technology  Advantages  Disadvantages  Conclusion  Reference.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Role Of Network IDS in Network Perimeter Defense.
1 May-2014 Automotive Protocols & Standards. 2 CAN (Controller Area Network)  Overview Controller Area Network is a fast serial bus designed to provide.
SENSOTRONIC BRAKE CONTROL
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Principles Identified - UK DfT -
Koji Nakao, Dai Arisue NICT, Japan
Critical Security Controls
Technology Overdrive Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car Dr. Barbara L. Ciaramitaro,
PRESENTED BY:BHABESH RANJAN MAHAKUD
Chapter 2: System Structures
CYBERSECURITY FOR AUTONOMOUS VEHICLES
3 Signs Indicating the Damaged Steering Angle Sensor of your Car
OBJECTIVES Discuss the need for electronic stability control (ESC).
Network and security practices in automotive systems
Network and security trends in connected cars
Future Vehicle-Based Alcohol Detection Systems
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Presentation transcript:

Experimental Security Analysis of a Modern Automobile Presented by Gaurav Mastakar

Authors Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno Department of Computer Science and Engineering University of Washington Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage Department of Computer Science and Engineering University of California San Diego

Abstract Automobiles are monitored and controlled Introduction of new potential risks Demonstration of fragility of system structure Electronic Control Unit (ECU) Range of experiments performed Possible to bypass network security Composite attacks

Introduction Automobiles contains myriad of computers Luxury sedan contains 100 MB binary code spread across 50-70 computers Safety the main concern Onboard Diagnostics port User-upgradable subsystems

Introduction (contn’d) Telematics system by GM’s OnStar features Integration of internal automotive subsystems with a remote command center via a wide- area cellular connection Hughes Telematics App Store Ford’s Sync Telematics system

Introduction (contn’d) Experiments on two passenger cars Test cars components to assess resilience Demonstrate ability to control components Combining these mount attacks Evaluation of security properties of each component and analyze network substrate

Background 250 million automobiles in US Automotive Embedded Systems: Self contained embedded systems called ECUs in 1970s Integrated into cars functioning and diagnostics

Background (contn’d) ECU Coupling: complex interactions across ECUs Electronic Stability Control (ESC): monitors wheel speed, steering angle, throttle position and accelerometers; modulates engine torque and wheel speed to increase traction Antilock Breaking System (ABS) Roll Stability Control (RSC): apply breaks, reduce throttle, modulate steering angle Activity Cruise Control (ACC): scan road ahead and increase decrease throttle. Eg: Audi Q7 Also provide pre-crash features

Background (contn’d) Luxury sedans even offer automated parallel parking features. eg: Lexus LS460 Electric driven vehicles require precise software control over power management and regenerative braking to achieve high efficiency, by a slew of emerging safety features Eg: GM’s OnStar will offer integration with Twitter

Background (contn’d) Car contains multiple buses (high-speed and low speed) Buses are bridged to provide subtle interaction requirements Eg: Central Locking System (CLS) controls power door locking mechanism CLS must also be connected to safety critical systems

Background (contn’d) Telematics: automation in automobiles GM’s OnStar: analyze OBD detect vehicle problems ECUs monitor crash sensors; OnStar personnel to perform functions; to do so bridge all important buses, connect to Internet via Verizon’s digital cellular service

Related Work Framing the vehicle security and privacy problem space Security problems of vehicle-to-vehicle systems Tuner subculture

Threat Model What an attacker could do? How an attacker could gain access? 1. Physical access: insert malicious component into cars internal network via OBD-II port 2. Via wireless interfaces: five kinds of digital radio interfaces accepting outside input; remotely compromise key ECUs in our car via externally-facing vulnerabilities, amplify the impact using the results in this paper, and ultimately monitor and control our car remotely over the Internet.

Experimental Environment Two 2009 automobiles with electronically controlled components and telematics system Two vehicles to allow differential testing and to validate the results were not tied to one car Also purchased individual replacement ECUs via third-party dealers to allow additional testing.

Experimental Environment (contn’d) Experiments with these cars—and their internal components—in three principal settings: Bench Stationary car On the road

Experimental Environment (contn’d) Bench Extract hardware Variant of CAN protocol

Experimental Environment (contn’d) Stationary car: Used CAN-to-USB interface Atmel AT90CAN128 development board with custom firmware

Experimental Environment (contn’d)

Experimental Environment (contn’d) On the road:

Intra-Vehicle Network Security Assess the security properties of CAN bus A. CAN Bus: link layer data protocol used for diagnostics used by BMW, Ford, GM, Honda

Intra-Vehicle Network Security (contn’d) CAN variant includes Slight extensions to framing Two separate physical layers Gateway bridge is used to route data Protocol standards define a range of services to be implemented by ECUs

Intra-Vehicle Network Security (contn’d) B. CAN Security Challenges: Broadcast Nature: Malicious component can snoop packets Fragility to DoS: CAN has priority based arbitration scheme with states dominant or recessive No Authenticator Fields: Any component can send CAN packet to any other component

Intra-Vehicle Network Security (contn’d) Weak Access Control: Protocol standards specify a challenge response sequence to protect ECUs Reflashing and memory protection: Tester Capabilities: restricts access to DeviceControl services Fixed challenge-response pairs are 16 bits ECUs allow response attempt every 10 sec Multiple ECUs can be cracked in parallel Physically removing the component

Intra-Vehicle Network Security (contn’d) ECU Firmware Updates and Open Diagnostic Control: Software only upgrades to ECUs As DeviceControl Service used in diagnosis of cars components, many attacks can be built on it

Intra-Vehicle Network Security (contn’d) Deviation from Standards Not all components follow standards Disabling Communications: ECUs should reject “disable CAN communications” Reflashing ECUs while driving: “The engine control module should reject a request to initiate a programming event if the engine were running.” Could place ECM and TCM into reflashing mode

Intra-Vehicle Network Security (contn’d) Noncompliant Access Control: Firmware and Updates: ECUs must be protected by challenge-response protocol Telematics Unit connected to cars CAN buses use hardcoded challenge and response common to all units can reflash the unit and can load our own code into telematics unit Should deny rights to read sensitive memory areas

Intra-Vehicle Network Security (contn’d) Standard states defining memory addresses that will not allow tester to read under any circumstances But could read reflashing keys out of BCM DeviceControl keys for ECM and TCM Extract telematics units entire memory

Intra-Vehicle Network Security (contn’d) Noncompliant Access Control: Device overrides: DeviceControl service override state of components ECUs should reject unsafe DeviceControl override requests Certain requests succeeded without authenticating

Intra-Vehicle Network Security (contn’d) Imperfect Network Segregation: standard states that gateways between the two networks must only be re-programmable from the high-speed network 2 ECUs on both buses and can bridge signals: BCM and Telematics unit which is not a gateway Verified that we could bridge these networks by uploading code into telematics unit

Component Security A. Attack Methodology 1. Packet Sniffing and Targeted Probing: Used CARSHARK to observe traffic on CAN buses Combination of replay and informed probing

Component Security (contn’d) 2. Fuzzing: Damage can be done by fuzzing of packets DeviceControl allows testing devices to override normal output functionality of ECU DeviceControl takes an argument called CPID Eg. BCM 3. Reverse Engineering: Dumped code via CAN ReadMemory service and used third party debugger (IDA pro) Essential for attacks that require new functionality to be added

Component Security B. Stationary Testing:

Component Security

Component Security

Component Security 1. Radio: completely control, disable user control and display arbitrary messages 2. Instrument Panel Cluster (IPC):

Component Security 3. Body Controller: control is split across low- speed and high-speed buses 4. Engine: attacks were found by fuzzing DeviceControl requests to the ECM Attack like disturb engine timing by resetting the learned crankshaft angle sensor error 5. Brakes: how to lock brakes without needing to unblock EBCM with its DeviceControl key 6. HVAC: control the cabin environment

Component Security 7. Generic DoS: disable communication of individual components on CAN bus C. Road Testing: car was controlled via a laptop running CARSHARK and connected to the CAN bus via the OBD-II port. Laptop controlled via wireless link to another laptop in chase car

Component Security EBCM needed to be unblocked to issue DeviceControl packets Able to release brakes and prevent from breaking Able to continuously lock brakes unevenly Road testing helped to completely characterize the brake behavior

Multi-Component Interactions A. Composite Attacks: 1. Speedometer: display an arbitrary speed or an arbitrary offset of the current speed intercepting speed update packets implemented as a CARSHARK module and as custom firmware for the AVR-CAN board tested by comparing displayed speed with actual speed

Multi-Component Interactions (contn’d) 2. Lights Out: disable interior and exterior lights requires the lighting control system to be in the “automatic” setting 3. Self-Destruct: demo in which a 60-second count-down is displayed on the Driver Information Center Kills the engine and activates the door lock relay

Multi-Component Interactions (contn’d) B. Bridging Internal CAN Networks BCM regulates access between two buses Telematics unit connected to both buses can be reprogrammed from device connected to low speed bus; acts as a bridge any device attached to low speed bus can bypass BCM gateway

Multi-Component Interactions (contn’d) C. Hosting Code; Wiping Code: Implant malicious code within telematics unit Complicating detection and forensic evaluations Perform action and erase evidence if attack code installed as per above method simply reboot

Discussion and Conclusions 1. Extent of damage: Didn’t anticipate that we would be able to directly manipulate safety critical ECUs or create unsafe conditions 2. Ease of attack: Automotive systems are fragile, simple fuzzing infrastructure 3. Unenforced Access Controls: could load firmware onto ECUs like Telematics unit and RCDLR without authentication; Critical ECUs respond to DeviceControl packets

Discussion and Conclusions (contn’d) 4. Attack Amplification: Maliciously bridging high-speed and low- speed networks Design code to erase evidence Components designed to tolerate failures but tolerating attacks not part of design

Discussion and Conclusions (contn’d) Future Work: 1. Diagnostic and Reflashing Services: Lock-down capabilities How could mechanics service and replace components Reflashing commands should only be issued with validation Physical access to car required before issuing dangerous commands

Discussion and Conclusions (contn’d) 2. Aftermarket Components: Allow owners to connect external filtering device between untrusted component and vehicle bus 3. Detection versus Prevention: if prevention is expensive, quick reversal is sufficient for certain class of vulnerabilities 4. Toward Security: See what is feasible practically and compatible with interests of a broader set of stakeholders

Questions ?

THANK YOU !!