EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications



Similar documents
Vehicular On-board Security: EVITA Project

Security risk analysis approach for on-board vehicle networks

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Security in Vehicle Networks

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

The relevance of cyber-security to functional safety of connected and automated vehicles

Automotive and Industrial Data Security

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

SHE Secure Hardware Extension

Hardware Security Modules for Protecting Embedded Systems

Hardware Security for Trustworthy C2X Applications Marko Wolf

Safety and security related features in AUTOSAR

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Cisco Advanced Services for Network Security

The research area of SET group is software engineering, and model-based software engineering in particular:

Chapter 1: Introduction

Embedding Trust into Cars Secure Software Delivery and Installation

IoT Security Platform

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Embedded Java & Secure Element for high security in IoT systems

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Information Security Basic Concepts

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Lecture VII : Public Key Infrastructure (PKI)

COSC 472 Network Security

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Secure software updates for ITS communications devices

UNCLASSIFIED Version 1.0 May 2012

Car Connections. Johan Lukkien. System Architecture and Networking

Patterns for Secure Boot and Secure Storage in Computer Systems

Applied and Integrated Security. C. Eckert

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

Basics of Internet Security

Maruleng Local Municipality

Secure cloud access system using JAR ABSTRACT:

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Chap. 1: Introduction

Program Automotive Security and Privacy

A Framework for Secure and Verifiable Logging in Public Communication Networks

IoT Security Concerns and Renesas Synergy Solutions

Recall the Security Life Cycle

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

Security Issues in SCADA Networks

Simple and error-free startup of the communication cluster. as well as high system stability over long service life are

Secure Key Management A Key Feature for Modern Vehicle Electronics

AURIX Preferred Design House. Hitex Development Tools GmbH Hitex (UK) Ltd.

Web Application Security Considerations

Introduction to Information Security

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Hi and welcome to the Microsoft Virtual Academy and

WIND RIVER SECURE ANDROID CAPABILITY

Security concept for gateway integrity protection within German smart grids

AUTOSAR Software Architecture

Threat Modelling and Risk Assessment Within Vehicular Systems

Safety Pilot Security System

EB TechPaper. Test drive with the tablet. automotive.elektrobit.com

PL-1, Pocket Logger B

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Securing VoIP Networks using graded Protection Levels

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Wireless Network Security

Lecture 7: Threat Modeling. CS 392/6813: Computer Security Fall Nitesh Saxena. *Adopted from a previous lecture by Nasir Memon

Overview. SSL Cryptography Overview CHAPTER 1

Automotive HMI: Current status and future challenges

Introduction to Computer Security

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car

Trusted Platforms for Homeland Security

Attachment A. Identification of Risks/Cybersecurity Governance

In-Vehicle Networking

Secure Data Exchange Solution

Embedded Security for Modern Building Automation Systems

Risk Management Guide for Information Technology Systems. NIST SP Overview

Full Drive Encryption Security Problem Definition - Encryption Engine

Cryptography and Network Security Chapter 1

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Guide to Vulnerability Management for Small Companies

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

CTR System Report FISMA

Security within a development lifecycle. Enhancing product security through development process improvement

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

Secure Cloud Storage and Computing Using Reconfigurable Hardware

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts

M-Shield mobile security technology

MEng, BSc Computer Science with Artificial Intelligence

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Cybersecurity And The Automotive Industry

IBM Crypto Server Management General Information Manual

future data and infrastructure

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

FAQ: (Data) security and privacy

Threat Model for Software Reconfigurable Communications Systems

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Transcription:

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé Seudié, Robert Bosch GmbH Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 2

Administrative project details Programme FP7-ICT-2007 of the European Community Research Area ICT-2007.6.2 ICT for Cooperative Systems Funding scheme Collaborative project Budget / Funding from European Community 6,022,807 / 3,825,993 Start date / End date / Duration 1 July 2008 / 30 June 2011 / 36 months Coordinator Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.v. Project Website http://www.evita-project.org 3 EVITA project objectives Objectives To design, verify, and prototype a secure architecture for automotive on-board electronics networks. Motivation In-vehicle IT security (trust anchor, secure storage of secret keys etc.) is required as a basis for secure inter-vehicular communication. Approach Hardware security modules at root of trust. Open specifications 4

EVITA project partners 5 EVITA project structure Dissemination and external interfaces Open specifications Liaison with related initiatives in the field of esafety Work packages Milestones 6

Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 7 Security requirements engineering Overview Description of system under investigation and use cases Identification of IT security threats Identification of IT security requirements to counter the threats Assessment of the risks associated with the threats and prioritization of the IT security requirements based on the risks addressed Analysis of legal requirements 8

Assumed automotive on-board network architecture Assets On-board electronic components such as ECUs, sensors, and actuators Links between components and within ECUs Software on the ECUs 9 Use case categories Vehicle-to-vehicle and vehicle-to-infrastructure communication Use of nomadic devices, USB sticks, or MP3 devices Aftermarket and workshop/diagnosis 10

Possible attack goals To gain advantages or just to harm others e.g. by enhancing traffic privileges (like forcing green lights ahead), fraudulent commercial transactions (like manipulating toll bills), hoaxes (like unauthorized active braking), avoiding liability for accidents, information theft, identity theft 11 Example attack tree The root represents the goal of an attack. Child nodes represent subgoals that could satisfy the parent attack goal. 12

IT security requirements Say what needs to be protected, but not how Based on compact functional models derived from use case descriptions, independent from implementation Main approach Incoming data and their origins shall be authentic. Outgoing data shall be confidential to an appropriate level. 13 Summary of security requirements Integrity of hardware security module Prevention/detection of tampering with hardware security modules Integrity and authenticity of in-vehicle software and data Unauthorized alteration of any in-vehicle software must be infeasible / detectable Integrity and authenticity of in-vehicular communication Unauthorized modification of data must be detectable by the receiver Confidentiality of in-vehicular communication and data Unauthorized disclosure of confidential data sent or stored must be infeasible. Proof of platform integrity and authenticity to other (remote) entities Capability to prove the integrity and authenticity of its platform configuration Access Control to in-vehicle data and resources Enabling availability and well-defined access to all data and resources 14

Risk analysis Risk associated with an attack is a function of: Severity of impact (i.e. harm to stakeholders) Probability of successful attack Not possible to quantify severity and probability in many applications but qualitative rankings allow relative severity, probability and risk to be identified 15 Security threat severity classification Class Safety Privacy Financial Operational S0 No injuries. No data access. No financial loss. No impact on operation. S1 S2 S3 S4 Light/moderate injuries. Severe injuries (survival probable). Moderate injuries for multiple units. Life threatening or fatal injuries. Severe injuries for multiple units. Fatal for multiple vehicles. Anonymous data only (no specific user or vehicle). Vehicle specific data (vehicle or model). Anonymous data for multiple units. Driver identity compromised. Vehicle data for multiple units. Driver identity access for multiple units. Low level loss (~ 10). Moderate loss (~ 100). Low losses for multiple units. Heavy loss (~ 1000). Multiple moderate losses. Multiple heavy losses. Impact not discernible to driver. Driver aware. Not discernible in multiple units. Significant impact. Multiple units with driver aware. Significant impact for multiple units. 16

Attack potential and probability of success Attack potential corresponds to the minimum effort required to create and carry out an attack evaluation using established structured approach from Common Criteria taking into account the required time, expertise, knowledge of system, window of opportunity, and equipment Indicative of probability of success Inverse relationship: Easy attacks more likely to be successful than difficult ones. Attack potential Rating 0 9 Basic Description Probability of success Likelihood Ranking Highly 5 likely 10 13 Enhanced basic Likely 4 14 19 Moderate Possible 3 20 24 High Unlikely 2 25 Beyond high Remote 1 Numerical scale used to represent relative ranking of probability of success 17 Sample asset attack ratings Attack Required attack potential Value Rating Probability of success Forward brake message from other neighbourhood 8 Basic 5 GPS spoofing 11 Enhanced-Basic 4 Access in-car interfaces 14 Moderate 3 Gain root access to embedded OS of HU 21 High 2 Flash malicious code to firmware of environment sensors 41 Beyond High 1 18

Risk mapping table (for situations controllable by driver) Risk level R Severity S i Probability of success P P=1 P=2 P=3 P=4 P=5 S i =1 0 0 1 2 3 S i =2 0 1 2 3 4 S i =3 1 2 3 4 5 S i =4 2 3 4 5 6 The less controllable the situation by the driver, the higher the safety-related risk. 19 Sample risk analysis Root labeled with severity vector S and controllability C OR: as easy as the easiest option Leaves labeled with probability of success P AND: as hard as the hardest element 20

Prioritising security requirements Security requirements mapped to attacks Summary of risk analysis collates results from risk assessment of all attack trees identifies risk levels found from attack trees and the number of their occurrences Interpretation few instances and/or low risk suggest low priority for protection high risk and/or many instances suggest higher priority for protection 21 Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 22

Secure on-board architecture design Overview Design a toolkit of security measures (software, hardware, and architectural) that can be selected for implementation in future automotive on-board systems Model Driven Engineering (MDE) approach under development Formal verification of security properties of Security Building Blocks 23 Fraunhofer SIT Security Modeling Framework Describes system behaviors as (sets of) sequences (traces) of actions Actions associated with agents (entities) in the system Satisfaction of security properties depends on the agents view of the system Authenticity = agent is certain of occurrence of an action Confidentiality = action parameter (e.g. sender or message contents) is indistinguishable for all other agents 24

Security engineering with formal model approach Describe protocols/mechanisms as Security Building Blocks (SeBB) Refine security requirements (external properties) through means to hardware/contractual roots (internal properties) 25 Hardware Security Module as security anchor Main goal Providing secure platform for cryptographic functionalities that support use cases Features Secure Storage Hardware Cryptographic Engines Secure CPU Core Scalable Security Architecture Advantages Flexibility Extendability Migration Path from existing SW solutions 26

Options of general structure of hardware security modules HSM physically separated from CPU Less secure than a single chip: connection between CPU and HSM not secure. Suitable for short-term designs or low-security applications with very small production runs Expensive: extra chip costs more due to the extra pins, HSM in the same chip as the CPU but with a state machine More secure than external chip and more cost-effective Not flexible: Hardware not modifiable, but automotive µc life cycle is more than 20 years Suitable for very high security applications with very short lifetimes Cryptographic applications will need to be implemented at the application CPU level: possible performance issues. Changing a state machine requires hardware redesign and is very expensive HSM in the same chip as the CPU but with a programmable secure core proposed solution Secure and cost-effective Flexible because of programmable core Usable for other industries 27 Classes of Hardware Security Modules Light HSM Security module applicable e.g. for sensors Medium HSM Selected security functions e.g. required for a gateway or router Full HSM Provides security for very critical application requiring powerful security Enabled by enough resources of the ECU 28

Topology of EVITA light version HSM sensor/actuator level 29 Topology of EVITA medium version HSM ECU Level 30

Topology of EVITA full version HSM ECU Level V2X 31 Hardware interface between HSM and application CPU HSM and application CPU have write/read rights for the Shared Memory Trigger through interrupts Optional polling: periodic check of the result buffer Interrupts EVITA Hardware Security Module Shared Memory Application CPU Databus 32

Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 33 Security architecture implementation Overview Prototype a secure on-board hardware architecture using a standard automotive controller with an FPGA acting as Hardware Security Module (secure cryptocoprocessor) Prototype a secure on-board software architecture, i.e. hardware drivers, basic software extensions (e.g., crypto library), and necessary security protocols Validate functional compliance, security compliance, partitioning (i.e. SW/HW, light/medium/full), performance, and costs of hardware and software implementation 34

Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 35 Prototype-based demonstration inside a lab car demonstrating e-safety applications based on vehicle-to-x communication to come 36

Presentation outline Project overview Overview of technical work packages Security requirements engineering Secure on-board architecture design Security architecture implementation Prototype-based demonstration Summary and outlook 37 Summary and outlook Summary Goal: Securing in-vehicular applications and components Achievements so far Security requirements analysis based on threat analysis Design of three classes of HSMs Design of a security software architecture based on AUTOSAR Next Steps Open specification of soft- and hardware design and protocols: Input for standardization Proof-of-concept by formal verification Prototypical implementation using the AUTOSAR stack CUBAS from Bosch Integration into a demonstrator 38

More information: Visit evita-project.org 39 Thank you for your attention. Dr.-Ing. Olaf Henniger Fraunhofer Institute SIT olaf.henniger@sit.fraunhofer.de Dipl.-Inf. Hervé Seudié Robert Bosch GmbH herve.seudie@de.bosch.com 40