security threats to automotive can networks - practical examples and selected short-term...

27
CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems April 15, 2013 Harshith Reddy Bandi

Upload: alijah-folsom

Post on 14-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security Threats to Automotive CANNetworks - Practical Examples andSelected Short-Term Countermeasures

(safecomp 2008)

CS 795 Cyber-Physical SystemsApril 15, 2013

Harshith Reddy Bandi

Page 2: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Vocabulary• Electronic Control Unit (ECU) is a generic term for any

embedded system that controls one or more of the electrical systems or subsystems in a motor vehicle.

• Actuator is a mechanical device for moving or controlling a mechanism or system. It takes energy, usually transported by air, electric current, or liquid, and converts that into some kind of motion.

• Sensor is a device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument .

• CAN bus (for controller area network) is a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer.

2

Page 3: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Why security is needed?

• Amount of ECUs or controllers in cars and other vehicles is increasing.• Communication from vehicles to other systems are

increasing.• Wireless access to cars is very probable in the future.• More intelligent systems attract attackers more.• Security violation results in dangerous situations and

compromises the safety of humans and environment• Even more important than in typical home PC.• Increasing number of communication channels introduce

new ways to break in to the system. 3

Page 4: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security in cars today

• Encryption & digital signatures used, but not broadly.• Keyless entry potential attack target.• Memory chips also potential attack target.• A reserved portion of memory contained in

modern ECUs is reserved to store diagnostic trouble codes (DTC).• Reactive Measures like Intrusion Detection

Systems(IDS) or IT-forensic investigations are not fairly established. 4

Page 5: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Four exemplary automotive IT security threats• Four significant test setups (denoted as attack scenarios S1–

S4) have been selected to perform a broader analysis of potential safety implications and to define and evaluate first countermeasures.

• A potential security incident that could have employed the described attacking technique is discussed by using the CERT taxonomy.

• The violation of security aspects in the four attack scenarios S1–S4 has been evaluated with a focus on the digital information communicated via the car’s internal bus networks shown in the table in next slide.

5

Page 6: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security aspects mapped to information within automotive bus systems.

6

Page 7: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Example Security Threats• Electric window lift (S1)

• Indicator lights(S2)

• Airbag control system(S3)

• Analyses on the gateway ECU(S4)

7

Page 8: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Test setup

8

Page 9: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Scenario S1: analyses on the electric window lift

9

Page 10: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

CERT classifications of S1-S4

Security implications:• Authenticity of control commands is violated• DoS attack: The windows do not respond correctly to authentic

requests until the attack finishes.• Non-repudiation is affected, since the authentic console cannot

prove that the close-commands have not been sent by itself.10

Page 11: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Scenario S2: analyses on the warning lights

11

Page 12: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security Implications:• Authenticity and integrity of control commands is violated.• Availability of the indicators is violated by the DoS attack

since they do not respond correctly to any actuation command.• Non-repudiation is affected, since the authentic ECU cannot

prove that it did not generate the forged unset-commands.

12

Page 13: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Scenario S3: analyses on the airbag control system

13

Page 14: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security Implications:• The authenticity of the periodic status messages and of

diagnostic reply is violated, since they are not generated by the airbag ECU but by a bogus device.

• Integrity of the periodic status information and the diagnostic data is concerned, since they do not correspond to the true system state.

• The availability of the entire airbag system is violated. 14

Page 15: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Scenario S4: analyses on the gateway ECU

15

Page 16: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Security Implications:• Confidentiality of eavesdropped internal messages is violated. • Looking at the diagnostics request injected, also the

authenticity of these requests is violated, since they are not sent by an authentic diagnostic tester but by a forged device.

• In case of personal or person relatable information, also the privacy can be affected.

16

Page 17: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Short-term Countermeasures

• Intrusion detection– Increased message frequency– Obvious misuse of message IDs– Low-level communication characteristics

• Proactive forensics support

17

Page 18: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Restrictions of Patterns 1–3 and potential for future research

18

• Effort and costs for development and implementation

1. Patterns 1 and 2 have the advantage that the detection algorithms are very simple to develop and implement.

2. The related effort and costs are the major downside of Pattern 3: the evaluation of respective signal properties can be expected to be complex in development.

• Effectiveness and performance

1. Patterns 1 and 2 can obviously only be used to detect an incident, as long as the authentic sender is still present and fully functional.

2. The main advantage of Pattern 3 is its potential to detect a broad spectrum of added or swapped devices.

Page 19: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Proactive forensics model phases

• Strategic preparation. In this phase, all the proactive measures need to be put in place because they have the potential to substantially support or even enable a following forensic investigation.

• Operational preparation. All the options, tools and potential data sources have to be considered, as well as potential influences from some measures.

• Data gathering phase. All potential data sources containing potential evidence for an IT security related incident have to be collected.

19

Page 20: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Proactive forensics model phases

• Data investigation phase. In which the collected data are transformed into data that can be interpreted by the human investigator.

• Data analysis phase. The interpreted data are correlated and reduced. The correlation combines evidence from different ECUs and puts them into a timeline and a causal context.

• Final documentation phase, the findings of the investigation have to be distilled into a report. Depending on the target audience, the technical content inside this report may vary.

20

Page 21: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Forensic data types

• Hardware data DT1. Hardware data are data in a system, which is not or only in a limited way influenced by the operating system and application.

• Raw data DT2. Raw data are a sequence of bits (or data streams) of components of the system not (yet) classified.

• Details about data DT3. Details about data constitute metadata added to user data. These can be stored within user data or externally.

• Configuration data DT4. Configuration data are data that can be changed by the operating system or applications, which modify the behaviour of the system but not its behaviour with regards to communication. 21

Page 22: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Forensic data types

• Communication protocol data DT5. Communication protocol data contain data, which modify the behaviour of the system with regards to communication.

• Process data DT6. Process data are data about a running process. That includes, for example, the status of the process, the owner of the process, its priority, memory usage or the related application.

• Session data DT7. Session data constitute data collected by a system during a session, regardless of whether the session was initiated by a user, an application or the operating system.

• User data DT8. User data are contents edited or consumed by the user. 22

Page 23: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Centralized vs. distributed to proactive measures in support of IT-forensics

• Centralized system, a dedicated supplemental unit would have to be installed into an existing automotive system and collect data, for instance, from the CAN bus network.

• Because of the problems caused by the missing authenticity checks in today’s bus systems, such a unit could ensure integrity and authenticity of the collected data only once it enters the unit.

• Distributed approach, each ECU’s functionality would have to be extended with proactive forensic support, which goes a lot further than today’s self-monitoring and diagnosis capabilities.

• It would require a lot more storage space for the recorded data and a substantial increase in processing power .

• The big advantage would be that additional sensory input only available at the particular ECU could be collected and IT security related incidents inside the ECU could potentially be recognized.

23

Page 24: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Proactive forensic measures—exemplary application to the attack scenarios S1–S4

• S1 and S2 - The forensic data types that are of primary concern are raw data DT2 (i.e. the data stream that constitutes the affected bus datagrams) and the communication protocol data DT5 (i.e. the type of CAN bus messages).

• S3 - The forensic data types that are of primary concern in S3 are raw data DT2 (i.e. the data stream that constitutes the bus datagrams) and configuration data DT4 (i.e. a disabled passenger seat airbag) as well as communication protocol data DT5 (i.e. the type of CAN bus message) and session data DT7 (i.e. status messages transmitted). 

• S4 - The forensic data types that are of primary concern are raw data DT2 (i.e. the data stream that constitutes the bus datagrams) and the communication protocol data DT5 (i.e. the type of CAN bus message).

24

Page 25: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Long-term solutions

• Holistic security concepts needed– Price is the problem– Hardware and software-based attacks• Bus solutions need to be revised

25

Page 26: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Acknowledgements

Information and figures are from “Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures”Tobias Hoppe n, Stefan Kiltz, Jana Dittmann

26

Page 27: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures (safecomp 2008) CS 795 Cyber-Physical Systems

Thank you

Questions??27