1 Integrity for Car-Computing A cryptographic vision for integrity in vehicle networks Eran Tromer Transportation CybserSecurity 18 Feb 2014.

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
A Crash Course in Modern Crypto Tools Dan Boneh Stanford University.
The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Zerocash Decentralized Anonymous Payments from Bitcoin
1 Information Security – Theory vs. Reality , Winter 2011 Lecture 2: Crypto review, fault attacks Eran Tromer (This lecture was given mostly.
1 Beyond Authentication Don’t Trust, Just Verify Eran Tromer BRCMF Inaguration Ceremony 21 Nov 2013.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Car Hacking Patrick, James, Penny.
UNIT 3 THE VEHICLE AND ITS COMPONENTS USE OF BASIC VEHICLE COMPONENTS

Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
ELI BEN-SASSON, ALESSANDRO CHIESA, ERAN TROMER AND MADARS VIRZA USENIX SECURITY SYMPOSIUM 2014 Succinct Non-Interactive Zero Knowledge for a von Neumann.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
ABS(Antilock braking system)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
The Fully Networked Car Geneva, 4-5 March 2009 Fully Networked Car and Climate Change Marc Osajda Global Automotive Strategy Manager Freescale Semiconductor.
Braking System Components
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
Copyright John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
NOAA: Promoting Safe and Efficient Commerce and Transportation January 2005 Charlie Challstrom.
Delivering results that endure Delivering Results that Endure Managing Risks in the Software Acquisition Process GFIRST Conference June 2007 Stan Wisseman.
1 Information Security – Theory vs. Reality , Winter Lecture 8: Integrity on untrusted platforms: Proof-Carrying Data Eran Tromer.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Design of Technical Condition Monitoring System of Vehicle Based on CAN Bus Authors : Ruili Zeng, Yunkui Xiao Department of Automobile Engineering Academy.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Vehicle Computer Security Jeff Smith. Am I safe operating my computer controlled vehicle?  Most people don’t understand the computers that run their.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
 Introduction  What is Driverless Car ?  History  Component  Action  Technology  Advantages  Disadvantages  Conclusion  Reference.
1 May-2014 Automotive Protocols & Standards. 2 CAN (Controller Area Network)  Overview Controller Area Network is a fast serial bus designed to provide.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
SENSOTRONIC BRAKE CONTROL (the brakes of the future)
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Principles Identified - UK DfT -
Cyber Physical System Security
University of Maryland College Park
Principles of Computer Security
INTELLIGENT CARPARK GUIDANCE SYSTEM
Role of Fuel Pump Relay (FPR) in Fuel Delivery System in an Automobile
Blockchains in 12 Easy Steps and Observations to Ponder…
Smart Car through IoT 라이 아샤리 리날디
WELCOME.
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Cloud Testing Shilpi Chugh.
Symptoms of a Faulty Cylinder Head Temperature Sensor.
Athith Amarnath, graduate Student Database and Security Research Group
TRUST:Team for Research in Applied Cryptography
RV-ECU: Maximum Assurance In-Vehicle Safety Monitoring
Smart Learning concepts to enhance SMART Universities in Africa
Safety-Critical Real-Time Support
Formal Analysis and Applications of Direct Anonymous Attestation
Global megatrends (relevant for our business)
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
CRYPTA LABS in collaboration with
Presentation transcript:

1 Integrity for Car-Computing A cryptographic vision for integrity in vehicle networks Eran Tromer Transportation CybserSecurity 18 Feb 2014

2 The first vehicle computer D-17B Minuteman I guidance system

3 The first vehicle computer D-17B Minuteman I guidance system

4 In-car integrity Modern cars contain dozens of Electronic Control Units Chinese counterfeit chips causing military hardware crashes […] Component failure reports from defense contractors worldwide, including Boeing, Raytheon, BAE, Northrop Grumman, and Lockheed […] and investigations have turned up a significant number of counterfeit parts, sometimes installed in mission- critical systems. Toyota's Killer Firmware: Bad Design & Its Consequences […] Oklahoma court ruled against Toyota in a case of unintended acceleration that led to the death of one of the occupants. Central to the trial was the Engine Control Module's (ECM) firmware. Can you trust them? –Hardware supply chain –Bad software –Errors –Bad updates –Attacks

5 Example: engaging ABS PCM ECU Powertrain Control Module Brake pedal switch Accelerator pedal position sensor ABS ECU Anti-Lock Brake System SJB ECU Smart Junction Box Brake pedal position sensor Parking brake switch Transmission PSCM ECU Power Steering Control Module PAM ECU Parking Aid Module 07 60: 04 B1 00 3C FF... “ABS ECU: Engage brakes fully” See [Miller Valasek 2013] 07 36: 03 B1 7E 80 … “SJB ECU: Crash” 07 36: 0B … “SJB ECU: Program firmware”

6 Approach: proof-carrying data PCM ECU Powertrain Control Module Brake pedal switch Accelerator pedal position sensor ABS ECU Anti-Lock Brake System SJB ECU Smart Junction Box Brake pedal position sensor Parking brake switch Transmission ECU PSCM ECU Power Steering Control Module PAM ECU Parking Aid Module “My message is […] and here’s a proof that I computed it correctly.” “My message is […] and here’s a proof that I computed it correctly based on a correct message from the PAM ECU” “My message is […] and here’s a proof that I computed it correctly” “My message is […] and here’s a proof that I computed it correctly based on a correct message from the Transmission ECU and signed sensor data” sig … “My message is BRAKE and here’s proof that it was computed correctly based on all of the above.” squeeeeeeeal sig

7 Integrity via Proof-Carrying Data m1m1 m2m2 m5m5 m6m6 Diverse network, containing untrustworthy parties and unreliable components. Enforce correctness of the messages and ultimate results. m3m3 m4m4 m7m7 m out 

8 Integrity via Proof-Carrying Data (cont.) Every message is augmented with a proof attesting to its compliance” with a prescribed policy. Compliance can express any property that can be verified by locally checking every node. Proofs can be verified efficiently and retroactively. If the final proof is OK, we can trust the result. m11m11 m22m22 m44m44 m55m55 m66m66 m77m77 m out  out m33m33

9 The road to Proof-Carrying Data FeasibilityNetworkC program size Program running time Papers TheoryProto- type Fast1 hopAnySmallAnyShortAny [Micali 94] [Groth 2010] [Chiesa Tromer 2010] [Ben-Sasson Chiesa Genkin Tromer Virza 2013] [Parno Gentry Howell Raykova 2013] [Ben-Sasson Chiesa Tromer Virza 2014] upcoming ? Used in Zerocash: anonymous Bitcoin [Ben-Sasson Chiesa Garman Green Miers Tromer Virza 2013] The correct execution of arbitrary C programs can be verified in 5 milliseconds using 230-byte proofs. SCIPR Lab

10 The road to Proof-Carrying Data on the road More efficient PCD: cost, latency Formally defining the critical security properties within a vehicle, and then applying PCD to enforce them Extending to V2V and V2I –Trusting other cars (that trust other cars (that trust other cars (that trust infrastructure (and other cars) ) ) ) –Protecting privacy using zero-knowledge proofs SCIPR Lab scipr-lab.org