Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri



Similar documents
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

WHITE PAPER. Security Testing For Financial Institutions

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

CMPT 471 Networking II

Intro to Firewalls. Summary

External Supplier Control Requirements

What is Really Needed to Secure the Internet of Things?

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

On-Premises DDoS Mitigation for the Enterprise

Leader in Converged IP Testing. Security Testing For Financial Institutions

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

Security Issues with Integrated Smart Buildings

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

Firewall Testing Methodology W H I T E P A P E R

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Cyber security measures in protection and control IEDs

Achilles Assurance Platform. Dr. Nate Kube Founder / CTO Wurldtech

ACHILLES CERTIFICATION. SIS Module SLS 1508

First Line of Defense to Protect Critical Infrastructure

REMOVING THE MYSTERY OF SECURITY ENGINES AND THEIR EFFECT ON YOUR NETWORK

Cisco Advanced Services for Network Security

Advantages of Managed Security Services

Security in Vehicle Networks

Deploying Firewalls Throughout Your Organization

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Data Security Concerns for the Electric Grid

Next Generation. VoIP Application Firewall.

Secure Software Programming and Vulnerability Analysis

Security and Risk Analysis of VoIP Networks

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Cautela Labs Cloud Agile. Secured.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Total Defense Endpoint Premium r12

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Chapter 9 Firewalls and Intrusion Prevention Systems

A Layperson s Guide To DoS Attacks

Attachment A. Identification of Risks/Cybersecurity Governance

Patch and Vulnerability Management Program

The research area of SET group is software engineering, and model-based software engineering in particular:

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

DeltaV System Cyber-Security

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Guideline on Firewall

Automotive Security Testing - The Digital Crash Test

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Defending Against Cyber Attacks with SessionLevel Network Security

Making your web application. White paper - August secure

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Voice Over IP (VoIP) Denial of Service (DoS)

Next-Generation Firewalls: Critical to SMB Network Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Security Implications Associated with Mass Notification Systems

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

NETWORK SECURITY ASPECTS & VULNERABILITIES

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

ensuring security the way how we do it

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Penetration Testing Service. By Comsec Information Security Consulting

New Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices. September 25, 2013

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Computer System Security Updates

FIREWALL POLICY DOCUMENT

Understanding and evaluating risk to information assets in your software projects

Protection profile of an industrial firewall

Application Security Backgrounder

PCI Security Scan Procedures. Version 1.0 December 2004

Document ID. Cyber security for substation automation products and systems

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Innovative Defense Strategies for Securing SCADA & Control Systems

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

Application Firewall Overview. Published: February 2007 For the latest information, please see

Telecom Equipment Assurance Testing

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Protection profile of an industrial firewall

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

FIREWALL POLICY November 2006 TNS POL - 008

External Supplier Control Requirements

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Network Instruments white paper

Transcription:

Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1

Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing TCP/IP and other wellknown protocols ECUs in different car domains will be interconnected with Ethernet backbones Multiple external interconnects including LTE, V2X, WiFi, BT, NFC, charging station, USB, diagnostic ports, etc. bandwidth connections

Types of Attacks

Car Hacking is a real threat There are numerous demonstrated car hacks Most documented attacks are physical attacks via CAN New attacks are possible via Automotive Ethernet networks There are hacking manuals / books for many cars Fewer cost barriers Automotive Ethernet connectivity devices are relatively cheap Free protocol analyzers available Fewer technology barriers Use of TCP/IP and Ethernet entices hackers from the IT domain to try to hack cars Automotive firmware is not updated quickly/frequently Once a weakness is known, it is hard to prevent attacks

Why is security important in automotive Potential results of car hacking Theft Loss of privacy Recalls or upgrades for insecure components Damage to the vehicle Bodily injury Loss of trust by the consumer Loss of revenue to the OEM

What is a vulnerability A vulnerability is a weakness which makes the system susceptible to unauthorized access or malicious behavior. Well-known (published) vulnerabilities are the #1 way that hackers gain access to a computer Common Vulnerabilities and Exposures (CVE) database Database used by all security companies Lists publicly known vulnerabilities Some are specific a platform, but many are generic Currently over 50,000 vulnerabilities identified Use of CVE is standardized by the ITU, NIST, etc.

Example of a Vulnerability How does a stack based buffer overflow work? Give this program 100 A s void foo(char *user_str) { char local_str[64]; strcpy(local_str, user_str); } intmain(intargc, char *argv[]) { if(argc!=2) { printf( usage: %s <in_string>\n, argv[0]); return 1; } foo(argv[1]); return 0; }

Automotive Network Diagram

Vulnerabilities, Exploit, Malware, and Viruses Definitions o Security vulnerability: a weakness which makes the system susceptible to an attack o Exploit: an attack that uses the vulnerability o Malware: any software that runs on a CPU and performs unwanted tasks o Virus: a type of Malware that is designed to spread to other CPUs (typically using a known vulnerability) Anti-Virus software detects instances of viruses and malware, but does not detect (or fix) the underlying vulnerability Finding and fixing vulnerabilities in every layer is critical to preventing attacks

Layered approach to security Layered security is the practice of combining multiple mitigating controls to protect resources and data Wikipedia In order to protect against a broad range of attacks, using multiple strategies is more effective If one layer is bypassed, other layers may offer protection When breach occurs, other subsystems should remain resilient to the attack For example, a Denial of Service attack should not affect the braking function of the car Each layer needs to be tested.

Conformance Testing Proper architecture, design, and implementation is the first line of defense Conformance testing is the second line of defense Conformance testing validates that the implementation conforms to the design specifications and standards o For every requirement in each applicable specification, there needs to be at least one conformance test o The robustness & security requirements must be considered when defining test cases o Both positive & negative tests are needed to ensure security robustness

Testing for known vulnerabilities There are multiple tools to test for known vulnerabilities The tools vary in their approaches and coverage No single test tool covers all vulnerabilities The tools run tests that exploit the vulnerability in a similar way to a hacker Screen from a tool running a test using 6000+ attacks

How Fuzzing Test Cases are Written Test cases are typically provided by the test tool vendor, but custom tests can be created Exploit is developed based on vulnerability description Test run and Ethernet traffic is captured Based on the capture, test is defined in the test tool Test is verified against a vulnerable system Sample capture of an exploit

Running in the Automotive Ethernet Environment Configure the test based on the Automotive Network o Test needs to be configured for the addresses & protocols used in the devices under test Some test use features not used in the automotive domain o ECUs only implement protocols & features required for operation o Tests need to be modified based on the ECU configuration Some tests need modifications for automotive-specific protocols o Examples include SOME/IP and diagnostics over IP Every system component (ECU, network infrastructure device, gateway, operating system, etc.) needs to be individually tested.

Fuzzing: Testing for Unknown Vulnerabilities Fuzzing is a technique where invalid, unexpected, or random data to the inputs of a computer program o Best technique to find unknown vulnerabilities such as buffer overflows or error handling o For Ethernet testing, specific fields of a protocol are fuzzed o In parallel, the system is monitored for faults (to identify vulnerabilities)

Fuzzing: Testing for Unknown Vulnerabilities Why fuzzing o Good architecture, design and review is a good first defense against unknown vulnerabilities o Even the best review will not find all vulnerabilities. o It is estimated that for every 1000 lines of well-written code, there is approximately 1 vulnerability o By generating values that software does not expect, fuzzing finds mistakes that are typically not found by conformance & performance tests (which focus on functional use cases)

Using Fuzzers For best results, use a protocol-aware fuzzerand configure the fuzzing based on an understanding of the protocol and implementation Start with white box testing at the function or component level o Fuzzing can be focused based on knowledge of the code o Easier to detect malfunctions with white-box testing o Use Code coverage analysis: condition coverage reveals what cases have been exercised by the fuzzing tool Work up to testing at the system level using black-box methodology o Repeat and expand on the tests run at the lower levels Run fuzzersfor a long time o Due to the random nature of fuzzing, finding vulnerabilities may take a long time To increase coverage, use different fuzz algorithms and fuzz different fields

Testing for Stability & Resiliency When an attack is attempted, it can have an effect on other components (even if the attack is unsuccessful) the amount of network traffic or function calls may increase response times from some components may increase ability to communicate with external devices may deteriorate memory consumption may go up It is important to evaluate all layers and components in the system to assess their stability and resiliency under such conditions.

Testing for Stability & Resiliency In order to test for Stability and Resiliency, several methodologies are used 1. Firewall testing is used to validate a gateway or firewall configuration and evaluate performance 2. DDoSmitigation testing evaluates a gateway or firewall operation under a DDoS attack and validates that malicious traffic is blocked 3. Stress testing is used to drive components beyond normal operational capacity to observe how the system functions 4. Resiliency testing is used to validate operation under degraded or failure conditions (i.e. a sensor failure) 5. Impairment testing is used to validate performance when communication is impaired (typically testing with delayed, dropped, or erroneous packets) 6. Functional and performance tests need to be run on the security components under attack conditions (as attack conditions should be part of the normal testing for security components)