FIA Protection Against Mileage Fraud by Common Criteria



Similar documents
Korea IT Security Evaluation and Certification Scheme

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Certification Report

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

Certification Report

Certification Report

How To Evaluate Watchguard And Fireware V11.5.1

Certification Report

C015 Certification Report

Automotive Software Development Challenges Virtualisation and Embedded Security

This guide will show you how to configure a Windows Mobile 6 PDA for Bluetooth connection to the KBM Systems OBDKey Bluetooth device.

Certification Report

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

Certification Report

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)

Security Standards BS7799 and ISO17799

Oracle Business Intelligence Enterprise Edition (OBIEE) Version with Quick Fix running on Oracle Enterprise Linux 4 update 5 x86_64

Thatcham Research The Insurers Automotive Research Centre

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Virtualization Backup/Replication Solution Comparison:

Penetration Testing. Presented by

Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP Version 1.01 (15 th April 2010)

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Guide to Digital Tachographs REGULATION (ECC) NO. 3821/1985 REGULATION (EC) NO. 561/2006. Údarás Um Shábháilteacht Ar Bhóithre Road Safety Authority

Certification Report

Embedded Java & Secure Element for high security in IoT systems

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

DMZ Gateways: Secret Weapons for Data Security

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Certification Report

The New OWASP Testing Guide v4

- Table of Contents -

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

- Toward Trustful IoT Life -

Proactively Secure Your Cloud Computing Platform

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

C033 Certification Report

White Paper How are thieves stealing modern vehicles?

Extending AADL for Security Design Assurance of the Internet of Things

GRPE Informal Working Group on Heavy Duty Hybrids

Switcher SW1 User Manual V2.2

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Certification Report

Security Issues with Integrated Smart Buildings

Learn the Essentials of Virtualization Security

Certification Report

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Learn the essentials of virtualization security

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

Certification Report

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Architecture Overview

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Application Security in the Software Development Lifecycle

INSTANT MESSAGING SECURITY

A Human Factor Interface for SIEM

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Kaspersky DDoS Prevention

On Security Evaluation Testing

Details for the structure and content of the ETR for Site Certification. Version 1.0

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Safety and security related features in AUTOSAR

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

TLS and SRTP for Skype Connect. Technical Datasheet

Joint Interpretation Library

Secure software development in the Russian IT Security Certification Scheme. Alexander Barabanov, Alexey Markov, Valentin Tsirlov

McAfee Network Security Platform Administration Course

Citrix Password Manager, Enterprise Edition Version 4.5

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

The Future of Network Security Sophos 2012 Network Security Survey

Transcription:

Informal document GRSG-108-37 (108th GRSG, 4-8 May 2015, agenda item 3) FIA Protection Against Mileage Fraud by Common Criteria UNECE 2015 05 05

FIA Protection against Mileage Fraud by Common Criteria Why does the FIA propose a protection against mileage fraud Summary Common Criteria Target of Evaluation (Annex 5,2) Protection Profile / Security Target ( 2.6, 5.5.2, Annex 5) Next Steps

FIA Protection against Mileage Fraud by Common Criteria Why does the FIA propose a protection against mileage fraud Mileage Fraud is a safety risk, it causes unexpected faults and leads to breakdowns Mileage Fraud undermines legal requirements on the durability of environmental relevant components Mileage Fraud leads to an annual loss of 5.6 9.6 billion for consumers Mileage Fraud affects 8% 12% of used car sales, rising to 30% 50% for cross border transactions Mileage Fraud can be done for many vehicles in about one minute via the OBD port. The frauding tools are available from 150,

Summary The FIA proposes to develop and verify the protection against mileage fraud with the methodology of common criteria according to ISO/IEC 15408 and ISO/IEC 18045. Protection level: Manipulations must be so time effort and cost intensive that they are no longer cost efficient compared to the higher sales price, risk of mortal danger or environmental perils that can be achieved during the complete lifetime of the vehicle. While the Protection Profile is unique and the method of common criteria is standardized, the Vehicle Manufacturer can still individually decide, what measures he takes to meet his specific Security Tag. It will be stated in the VM specific Security Target. The type approval authority must only check the successful evaluation result for VM specific solution.

Common Criteria FIA proposes the standardized methodology of Common Criteria to ease the development for vehicle manufacturers and the approval for authorities of the protected mileage data. The approach is technology neutral, as it defines a single Protection Profile, but leaves it up the manufacturer how to realize the solution by his individual Security Target. The methodology of Common Criteria is an approved IT process, accepted in 27 countries around the world and under constant development to stay state of the art. The base for ISO/IEC 15408 and ISO/IEC 18045 is given publically under http://www.commoncriteriaportal.org/cc/ (CC and CEM).

Common Criteria used for protection against Mileage Fraud A Protection Profile (PP) document for the mileage data must be deployed. It state the assets to be protected, the required protection level and can be understood as a kind of catalogue for threats and protection mechanisms. This single document will be used as general base for all VMs A Security Target (ST) document will map the Protection Profile to the individual realization in a system. Thereby, items from the catalogue PP will be selected and it will be described, how they act to reach the protection level. This allows a VMspecific implementation An Evaluation will be performed by independent, accredited labs on the Target of Evaluation (TOE = implementation at the VM) under consideration of PP and ST in order to verify that the required Protection Level is met The Evaluation Test Report (ETR) of the lab will reveal areas of improvements to VM and deliver a successful confirmation for usage towards the type approval authority

Common Criteria used for protection against Mileage Fraud Framework Common Criteria (ISO/IEC 15408 and ISO/IEC 18045) Protection Profile for Mileage Fraud Protection Security Target for VM individual realization Evaluation Test Report for Target of Evaluation

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.4 The ABS Sensor counts the tours of the wheel. It is the initial data of the mileage Manipulating the sensor leads to wrong mileage data

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.4 The communication channel system transfers data Man in the Middle attacks like resitors falsify the transferred data

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.4 The communication channel system transfers data Man in the Middle attacks like resitors falsify the transferred data

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.4 The communication channel system transfers data Man in the Middle attacks like resitors falsify the transferred data

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.1/2.2 The computation and storage subsystem computes the data from the ABS sensor to mileage numbers and stores it Unprotected data in ECUs can be overwritten via the OBD port

Target of Evaluation (TOE, Annex 5, 2) Most manipulations done via OBD port in about 1 minute 2.1/2.2 The computation and storage subsystem computes the data from the ABS sensor to mileage numbers and stores it Unprotected data in ECUs can be overwritten via the OBD port

Target of Evaluation (TOE, Annex 5, 2) Manipulations via resistors or OBD port lead to false displayed data Most manipulations done via OBD port in about 1 minute 2.3 The mileage display subsystem transfers computed data to readable numbers and displays them

FIA Protection against Mileage Fraud by Common Criteria Protection Profile / Security Target ( 2.6, & 5.5.2, Annex 5) Security Target: 1000 (higher sales price for tampered vehicle) Target of Evaluation: Gateway ECU Solution: Secured Data Storage behind a Firewall in the Gateway ECU Most manipulations done via OBD port in about 1 minute

FIA Protection against Mileage Fraud by Common Criteria Protection Profile / Security Target ( 2.6, & 5.5.2, Annex 5) Security Target 6000 (higher sales price for tampered vehicle) Target of Evaluation: Whole Odometer System Solution: Encrypted Data Transfer and Storage of Data behind Firewall Most manipulations done via OBD port in about 1 minute

FIA Protection against Mileage Fraud by Common Criteria Next steps Find support in UNECE WP 29 for the FIA proposal Setup an informal working group with all stakeholders to work out the protection profile

FIA Protection against Mileage Fraud by Common Criteria Thank You For Your Attention