Secure software updates for ITS communications devices



Similar documents
Security risk analysis approach for on-board vehicle networks

The relevance of cyber-security to functional safety of connected and automated vehicles

Securing the Internet of Things

The Trend Toward Convergence of Physical and Logical (Cyber) Security

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Technical Standards for Information Security Measures for the Central Government Computer Systems

Vehicular On-board Security: EVITA Project

90% of data breaches are caused by software vulnerabilities.

Lecture VII : Public Key Infrastructure (PKI)

Frost & Sullivan Cybersecurity Presentation

The Internet of Things: 4 security dimensions of smart devices

INSTANT MESSAGING SECURITY

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Automotive and Industrial Data Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Wireless Network Security

TRW Automotive TRW Automotive Profile 2012

Internet Banking Internal Control Questionnaire

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Security in Vehicle Networks

Understanding and Integrating KODAK Picture Authentication Cameras

Automotive Software Development Challenges Virtualisation and Embedded Security

Applying Cryptography as a Service to Mobile Applications

WE MAKE SECURITY WORK

Testing the Internet of Things

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

You don t hear me but your phone s voice interface does. José LOPES ESTEVES & Chaouki KASMI

Wireless Asset Management

Detailed Description about course module wise:

COSC 472 Network Security

Hacking cars in the style of Stuxnet

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Security for the Internet of Things (IoT) John Yeoh, IoT Working Group

Symantec Client Management Suite 8.0

Hardware Security Modules for Protecting Embedded Systems

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Embedded Security for Modern Building Automation Systems

Introduction CHAPTER 1

Longmai Mobile PKI Solution

A Framework for Secure and Verifiable Logging in Public Communication Networks

A Model-based Methodology for Developing Secure VoIP Systems

Problems of Security in Ad Hoc Sensor Network

VEHICLE CYBERSECURITY. DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Realworld

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Connected and Automated Vehicles and the Cybersecurity Threat

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Authentication in WLAN

Security Levels for Web Authentication using Mobile Phones

iphone in Business Mobile Device Management

Secure by design: taking a strategic approach to cybersecurity

Application Intrusion Detection

Network Access Security. Lesson 10

In the pursuit of becoming smart

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Smart Card Authentication. Administrator's Guide

Embedding Trust into Cars Secure Software Delivery and Installation

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ITL BULLETIN FOR AUGUST 2012

Chapter 7 Information System Security and Control

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June

Network Security Administrator

Den Gode Webservice - Security Analysis

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Business Phone Security. Threats to VoIP and What to do about Them

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

MOBILE GAMING SYSTEM POLICIES

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Public Key Applications & Usage A Brief Insight

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council


The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control

Chap. 1: Introduction

IoT Security Concerns and Renesas Synergy Solutions

PopimsCard. Franck GUIGAN The magic card. February

Penetration testing & Ethical Hacking. Security Week 2014

Cyber-Security in the Connected Car Age

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

Transcription:

Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute, NICT 1

Outline Background Computerization of vehicle Necessity of remote update (maintenance) of vehicle Threats against networked vehicle General remote update procedure and threat analysis An approach of international standardization in ITU-T Introduction of Secure software update capability for ITS communications devices Conclusion 2

Background 3

Computerization of vehicle 50% 100 Proportion of electronic components of car production costs Number of ECUs (Electronic Control Unit) in luxury models 100 million Number of program lines of car software Number of networks in a car (average) 5 2 miles Length of cable in a car Software Development Volume Software Development Cost Multimedia Audio Vehicle body Air bag Assist Chassis HV Powertrain 4

Necessity of remote update (maintenance) of vehicle Improvement of vehicle Software modules inside ECUs must be frequently updated e.g.) bug fix, performance and security improvement Cost Reduction Failure of the software accounts for about 30% of the current recall of the cars. Manufacturers and users expect benefit from the remote update service 5

Remote exploitation against FIAT Chrysler s Jeep Cherokee 6

Remote exploitation against FIAT Chrysler s Jeep Cherokee Research activity by two hackers An article published in a news website Detail will be presented at Black Hat USA 2015 (5-6, Aug) Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller, Security Engineer, Twitter Chris Valasek, Director of Security Intelligent at IOACTIVE, INC. Demonstration of attacks against FIAT Chrysler s Jeep Cherokee Remote exploit attack against an Internet-connected device (UConnect) Remotely controlled the vehicle on the highway Abuse a steering wheel Abuse brake and accelerator On/Off of the engine 7

General remote update procedure and threat analysis for networked vehicle 8

Model data flow of remote software update Supplier..... Vehicle mobile gateway Update Server at Car.. Manufacturer ECU (VMG) User Interface 1. Supplier provides an update module to a car update manufacturer. request 2. Vehicle mobile gateway requests ECUs to diagnose themselves and submit their software list. list 3. ECUs generate a software list and submit it to the Vehicle mobile gateway. report 4. The vehicle mobile gateway gathers the lists of software and submit them to update server. receipt request for each step in the procedure update Conducted threat analysis 5. Update server issues a receipt of the software list for vehicle mobile gateway. 6. Update server determines necessary software modules for each ECU. 7. After a certain period of time, the vehicle mobile gateway requests update modules for the vehicle. 8. Update software modules are delivered to vehicle mobile gateway. notification 9. The gateway pushes a notification to a user interface. confirmation 10. The car owner confirms to apply the update via the user interface. update update 11. Vehicle mobile gateway delivers the updates to corresponding ECUs and request them to apply the updates. 12. Each ECU applies the update and reports the application result to the vehicle mobile gateway. update 13. Finally the vehicle mobile gateway submits a report of application results to the update server. receipt 14. Finally the vehicle mobile gateway submits a report of application results to the update server. 9

Threat analysis: example case 1 Impersonation of VMG! DoS attack against ECUs by sending frequent requests Tampering / eavesdropping / replay of a message! An illegitimate request message is sent to ECUs by an attacker in order to illegally acquire software information! DoS attack against ECUs by sending frequent requests 10

Threat analysis: example case 2 Impersonation of ECU! Improper software information is uploaded to VMG! DoS attack against VMG by sending forged data (e.g., enormously huge data) Impersonation of VMG! Software information on every ECU in the vehicle is improperly collected Tampering / eavesdropping / replay of a message! Improper software information is uploaded to VMG! Software information on every ECU in the vehicle is improperly collected! DoS attack against VMG by sending forged data (e.g., enormously huge data) 11

Functional Requirements for the secure software update Message verification Threats: tampering, eavesdropping and replaying of messages Measure: message verification mechanism based on Message Authentication Code (MAC) or digital signature method Trusted boot of ECUs Threats: tampering of software in ECU Measure : hardware Security Module (HSM) to verify software modules in ECUs boot sequences Authentication of communication entity Threats: impersonation of the entities Measure : authentication of both client and server of each communication based authentication protocol such as SSL/TLS Message filtering Threats: DoS attack against VMG or update server Measure : message filtering based on white listing of senders and frequency limitation of received messages, etc. 12

An approach of international standardization in ITU-T Introduction of Secure software update capability for ITS communications devices 13

Development of an ITU-T Recommendation ITU-T: International Telecommunication Union, Telecom sector SG17: Responsible for security standards Title of Recommendation Secure software update capability for ITS communications devices (X.itssec-1) Purpose to provide common methods to update the software by a secure procedure Editor Masashi Eto (NICT) Koji Nakao (KDDI/NICT) 14

Functional Requirements for the secure software update Message verification Threats: tampering, eavesdropping and replaying of messages Measure: message verification mechanism based on Message Authentication Code (MAC) or digital signature method Trusted boot of ECUs Threats: tampering of software in ECU Measure : hardware Security Module (HSM) to verify software modules in ECUs boot sequences Authentication of communication entity Threats: impersonation of the entities Measure : authentication of both client and server of each communication based authentication protocol such as SSL/TLS Message filtering Threats: DoS attack against VMG or update server Measure : message filtering based on white listing of senders and frequency limitation of received messages, etc. 15

General message format with security functions Digital signature method message Communication data Protocol version Content type Signer ID type Public key certificate Signature target data Signature Flag Service ID Application Length information Application data Time with standard deviation Three D location Public key certificate Protocol version Content type Signer ID type Signature algorithm Certificate specific data Expiration CRL_ID Public key information Signature Algorithm Public key MAC method message Communication data Protocol version Content type MAC target data MAC Type Equipment ID ID of expired equipment ID list Key version Algorithm Application information Length Application data Time with standard deviation Three D location 16

Application data format for each message type Message format Message category (diagnose_report) Message type (request / response / submit) Status code Issued date Expiration date Extension Length Extension data 17

Conclusion Threat analysis in a general software update procedure Impersonation of entities, tampering of software in ECU, etc., Introduction of ITU-T draft Recommendation X.itssec-1 Secure software update capability for ITS communications devices Message verification Trusted boot Authentication of communication entity Message filtering The standardization activity on this topic should be accelerated in corporation with car manufactures/venders in ITU-T SG17 Future plan for developing this Recommendation ITU-T SG17 meeting at Geneva, Sep, 2015 Pre-final revision to request for comments ITU-T SG17 meeting at Geneva, Mar, 2016 To be approved as a Recommendation 18

19

Threat analysis In total, 53 threats have been found. According to the threats, possible countermeasures have been studied. ITU-Tで53の 脅 威 解 析 を 実 施 していないと 思 います が どこのを 引 用 しています か?? 20

Remote exploitation against Jeep Cherokee 21

Connected Vehicles Internet connection (LTE, 3G, Wi-Fi, Bluetooth ) via customer s smartphone, SIM embedded in the vehicle, etc. Autonomous car Control engines and brakes based on the information from roadside infrastructure as well as car-mounted sensors, cameras, and radars 22

Scope of the Recommendation Functionality of Server! Stored Data Definition Auth info Log Audit With considerations of privacy concerns Communication protocol! Between Car and Manufacturer / Garage! Encryption! Authentication Functionality of Head Unit! Status check of ECUs! Log collection! In-car diagnosis function Diagnosis of on-board devices! Status check of ECUs! Log collection! Verification of update module Aftermarket Information Device On-board Information Device Car Manufacturer / Garage center Power Management Control ECU Seat Belt Control ECU Driving Support ECU Supplier Communication Path...... Update Server / log database Communication Path Vehicle Mobile Gateway Parking Assist ECU Skid Control ECU etc., 23

More Attacks Surfaces! http://gigaom.com/2013/08/06/ciscos-remedy-for-connected-car-security-treat-the-car-like-an-enterprise/ 24

General model of networked vehicle Aftermarket Information Device On-board Information Device Car Manufacturer / Garage center Power Management Control ECU Seat Belt Control ECU Driving Support ECU Supplier Communication Path...... Update Server / log database Communication Path Vehicle Mobile Gateway Parking Assist ECU Skid Control ECU etc., 25