Feasible car cyber defense - ESCAR 2010
-
Upload
iddan-halevy -
Category
Technology
-
view
747 -
download
2
Transcript of Feasible car cyber defense - ESCAR 2010
![Page 1: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/1.jpg)
Feasible Car Cyber Defense
Arilou Information Security Technologies LTD.
![Page 2: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/2.jpg)
Arilou Technologies
![Page 3: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/3.jpg)
The modern car
• Sophisticated and computerized• Decentralized electronic system
Usually consists of dozens of computers (ECUs – electronic control units) and sensors
New functionalities – hundreds MBs of code Connected by one or more network segments
• Autonomous cars
![Page 4: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/4.jpg)
The modern car
![Page 5: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/5.jpg)
The rising threat
• ECUs controlled mechanisms Brakes Stability control Airbags …
• CAN bus connected• Rising wave of cyber attacks
![Page 6: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/6.jpg)
Hacking a system
• Demonstrated by US researchers - hack using RDS, Bluetooth and more
• Hack a widespread infotainment system using hostile files With no prior knowledge No budget Goal: estimate the possibility of such scenario
![Page 7: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/7.jpg)
Infotainment Hack
internet
![Page 8: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/8.jpg)
Hacking process
• Understand inner working and get binaries• Reversing the binaries – focus on input parsing• Finding exploitable vulnerabilities
• Implementing the exploit
![Page 9: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/9.jpg)
The result
![Page 10: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/10.jpg)
Conclusion
Cars were designed for safety and functionality – not for Security
![Page 11: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/11.jpg)
The challenge
• Huge number of suppliers• Lots of external interfaces• Every cent counts• Time critical communication• Legacy systems• Zero tolerance for mistakes
![Page 12: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/12.jpg)
Possible solutions
![Page 13: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/13.jpg)
Cryptography
• Confidentiality• Integrity• Authenticity
• Can solve some of the issues The automotive world is far from ideal for this
![Page 14: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/14.jpg)
Cryptography Difficulties• Key exchange and management• Symmetric keys:
Identical to all units – vulnerable Not identical – complicated to manage
• Asymmetric keys: Time and computing complexity – cost PK infrastructure needed
• Maintenance nightmare – for a mission critical solution• Export restrictions• The industry is too decentralized• Does not solve vulnerabilities
Exploit can use the crypto mechanisms to encrypt The more sophisticated the system the larger the attack surface
![Page 15: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/15.jpg)
CAN bus firewall• A rule based CAN bus Firewall
Whitelist Rate limit Authentication
• Independent device Single non-expensive chip aftermarket or integrated SOC Military grade Thoroughly tested
• Architecture As general rule does not require redesign of ECU’s
software or vehicle’s network
![Page 16: Feasible car cyber defense - ESCAR 2010](https://reader035.fdocuments.net/reader035/viewer/2022062320/55d4d720bb61ebe5488b46f1/html5/thumbnails/16.jpg)
Questions?