HOME

TheInfoList



OR:

Automotive security refers to the branch of
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
focused on the cyber risks related to the automotive context. The increasingly high number of ECUs in vehicles and, alongside, the implementation of multiple different means of communication from and towards the vehicle in a remote and wireless manner led to the necessity of a branch of
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
dedicated to the threats associated with vehicles. Not to be confused with
automotive safety Automotive safety is the study and practice of automotive design, construction, equipment and regulation to minimize the occurrence and consequences of traffic collisions involving motor vehicles. Road traffic safety more broadly includes roadw ...
.


Causes

The implementation of multiple ECUs (Electronic Control Units) inside vehicles began in the early '70s thanks to the development of
integrated circuits An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
and
microprocessors A microprocessor is a computer processor for which the data processing logic and control is included on a single integrated circuit (IC), or a small number of ICs. The microprocessor contains the arithmetic, logic, and control circuitry r ...
that made it economically feasible to produce the ECUs on a large scale. Since then the number of ECUs has increased to up to 100 per vehicle. These units nowadays control almost everything in the vehicle, from simple tasks such as activating the wipers to more safety-related ones like
brake-by-wire Brake-by-wire technology in the automotive industry is the ability to control brakes through electronic means, without a mechanical connection that transfers force to the Brake#Types, physical braking system from a driver input apparatus such as a ...
or ABS (Anti-lock Braking System).
Autonomous driving Vehicular automation is using technology to assist or replace the operator of a vehicle such as a car, truck, aircraft, rocket, military vehicle, or boat. Assisted vehicles are ''semi-autonomous'', whereas vehicles that can travel without a ...
is also strongly reliant on the implementation of new, complex ECUs such as the ADAS, alongside sensors (
lidar Lidar (, also LIDAR, an acronym of "light detection and ranging" or "laser imaging, detection, and ranging") is a method for determining ranging, ranges by targeting an object or a surface with a laser and measuring the time for the reflected li ...
s and
radar Radar is a system that uses radio waves to determine the distance ('' ranging''), direction ( azimuth and elevation angles), and radial velocity of objects relative to the site. It is a radiodetermination method used to detect and track ...
s) and their control units. Inside the vehicle, the ECUs are connected with each other through cabled or wireless communication networks, such as
CAN bus A controller area network bus (CAN bus) is a vehicle bus standard designed to enable efficient communication primarily between electronic control units (ECUs). Originally developed to reduce the complexity and cost of electrical wiring in auto ...
(controller area network), MOST bus (Media Oriented System Transport),
FlexRay FlexRay is an automotive network communications protocol developed by the FlexRay Consortium to govern on-board automotive computing. It is designed to be faster and more reliable than CAN and TTP, but it is also more expensive. The FlexRay co ...
(Automotive Network Communications Protocol) or RF (radio frequency) as in many implementations of TPMSs (tire-pressure monitoring systems). Many of these ECUs require data received through these networks that arrive from various sensors to operate and use such data to modify the behavior of the vehicle (e.g., the
cruise control Cruise control (also known as speed control, cruise command, autocruise, or tempomat) is a system that automatically controls the speed of an automobile. The system is a servomechanism that takes over the car's throttle to maintain a steady sp ...
modifies the vehicle's speed depending on signals arriving from a button usually located on the steering wheel). Since the development of cheap wireless communication technologies such as
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is li ...
,
LTE LTE may refer to: Science and technology * LTE (telecommunication) (Long-Term Evolution), a mobile telephony standard ** LTE Advanced, an enhancement ** LTE Advanced Pro, a further enhancement * Compaq LTE, a line of laptop computers * Leukotrie ...
,
Wi-Fi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
,
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
and similar, automotive producers and OEMs have designed ECUs that implement such technologies with the goal of improving the experience of the driver and passengers. Safety-related systems such as the
OnStar OnStar Corporation is a subsidiary of General Motors that provides subscription-based telecommunication, communications, in-vehicle security, emergency services, turn-by-turn navigation, and remote diagnostics systems throughout the United States, ...
from
General Motors General Motors Company (GM) is an American Multinational corporation, multinational Automotive industry, automotive manufacturing company headquartered in Detroit, Michigan, United States. The company is most known for owning and manufacturing f ...
,
telematic Telematics is an interdisciplinary field encompassing telecommunications, vehicular technologies (road transport, road safety, etc.), electrical engineering (sensors, instrumentation, wireless communications, etc.), and computer science (multimedia ...
units, communication between smartphones and the vehicle's speakers through Bluetooth,
Android Auto Android Auto is a mobile app developed by Google to mirror features of a smartphone (or other Android device) on a car's dashboard information and entertainment head unit. Once an Android device is paired with the car's head unit, the system ...
and
Apple CarPlay CarPlay and CarPlay Ultra is an Apple Inc., Apple standard that enables a car radio or automotive head unit to be a display and controller for an iOS device. It is available on iPhone 5 and later models running iOS 7.1 or later. More than 800 ...
.


Threat model

Threat model Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized. The purpose of threat modeling is to provide d ...
s of the automotive world are based on both real-world and theoretically possible attacks. Most real-world attacks aim at the safety of the people in and around the car, by modifying the cyber-physical capabilities of the vehicle (e.g., steering, braking, accelerating without requiring actions from the driver), while theoretical attacks have been supposed to focus also on privacy-related goals, such as obtaining GPS data on the vehicle, or capturing microphone signals and similar. Regarding the
attack surface The attack surface of a software environment is the sum of the different points (for " attack vectors") where an unauthorized user (the "attacker") can try to enter data to, extract data, control a device or critical software in an environment. Ke ...
s of the vehicle, they are usually divided in long-range, short-range, and local attack surfaces:
LTE LTE may refer to: Science and technology * LTE (telecommunication) (Long-Term Evolution), a mobile telephony standard ** LTE Advanced, an enhancement ** LTE Advanced Pro, a further enhancement * Compaq LTE, a line of laptop computers * Leukotrie ...
and
DSRC Dedicated short-range communications (DSRC) is a technology for direct wireless exchange of vehicle-to-everything (V2X) and other intelligent transportation systems (ITS) data between vehicles, other road users (pedestrians, cyclists, etc.), and ...
can be considered long-range ones, while Bluetooth and Wi-Fi are usually considered short-range although still wireless. Finally,
USB Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical ...
, OBD-II and all the attack surfaces that require physical access to the car are defined as local. An attacker that is able to implement the attack through a long-range surface is considered stronger and more dangerous than the one that requires physical access to the vehicle. In 2015 the possibility of attacks on vehicles already on the market has been proven possible by Miller and Valasek, that managed to disrupt the driving of a
Jeep Cherokee The Jeep Cherokee is a line of sport utility vehicles (SUV) manufactured and marketed by Jeep over five generations. Marketed initially as a variant of the Jeep Wagoneer (SJ), the Cherokee has evolved from a full-size SUV to one of the first ...
while remotely connecting to it through remote wireless communication.


Controller area network attacks

The most common network used in vehicles and the one that is mainly used for safety-related communication is CAN, due to its real-time properties, simplicity, and cheapness. For this reason the majority of real-world attacks have been implemented against ECUs connected through this type of network. The majority of attacks demonstrated either against actual vehicles or in testbeds fall in one or more of the following categories:


Sniffing

Sniffing in the computer security field generally refers to the possibility of intercepting and logging packets or more generally data from a network. In the case of CAN, since it is a
bus network A bus network is a network topology in which Node (networking), nodes are directly connected to a common half-duplex link called a bus (computing), bus. A Host (network), host on a bus network is called a ''station''. In a bus network, every ...
, every node listens to all communication on the network. It is useful for the attacker to read data to learn the behavior of the other nodes of the network before implementing the actual attack. Usually, the final goal of the attacker is not to simply sniff the data on CAN, since the packets passing on this type of network are not usually valuable just to read.


Denial of service

Denial of service (
DoS DOS (, ) is a family of disk-based operating systems for IBM PC compatible computers. The DOS family primarily consists of IBM PC DOS and a rebranded version, Microsoft's MS-DOS, both of which were introduced in 1981. Later compatible syste ...
) in information security is usually described as an attack that has the objective of making a machine or a network unavailable.
DoS DOS (, ) is a family of disk-based operating systems for IBM PC compatible computers. The DOS family primarily consists of IBM PC DOS and a rebranded version, Microsoft's MS-DOS, both of which were introduced in 1981. Later compatible syste ...
attacks against ECUs connected to CAN buses can be done both against the network, by abusing the arbitration protocol used by CAN to always win the arbitration, and targeting the single ECU, by abusing the error handling protocol of CAN. In this second case the attacker flags the messages of the victim as faulty to convince the victim of being broken and therefore shut itself off the network.


Spoofing

Spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
s comprise all cases in which an attacker, by falsifying data, sends messages pretending to be another node of the network. In automotive security usually spoofing attacks are divided into masquerade and
replay attack A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary w ...
s. Replay attacks are defined as all those where the attacker pretends to be the victim and sends sniffed data that the victim sent in a previous iteration of authentication. Masquerade attacks are, on the contrary, spoofing attacks where the data payload has been created by the attacker.


Real life automotive threat example

Security researchers Charlie Miller and
Chris Valasek Chris Valasek is a computer security researcher with Cruise Automation, a self-driving car startup owned by GM, and most recently known for his work in automotive security research. Career Prior to his current employment, he worked for: * ...
have successfully demonstrated remote access to a wide variety of vehicle controls using a
Jeep Cherokee The Jeep Cherokee is a line of sport utility vehicles (SUV) manufactured and marketed by Jeep over five generations. Marketed initially as a variant of the Jeep Wagoneer (SJ), the Cherokee has evolved from a full-size SUV to one of the first ...
as the target. They were able to control the radio, environmental controls, windshield wipers, and certain engine and brake functions. The method used to hack the system was implementation of pre-programmed chip into the controller area network (CAN) bus. By inserting this chip into the CAN bus, he was able to send arbitrary message to CAN bus. One other thing that Miller has pointed out is the danger of the CAN bus, as it broadcasts the signal which the message can be caught by the hackers throughout the network. The control of the vehicle was all done remotely, manipulating the system without any physical interaction. Miller states that he could control any of some 1.4 million vehicles in the United States regardless of the location or distance, the only thing needed is for someone to turn on the vehicle to gain access. The work by Miller and Valasek replicated earlier work completed and published by academics in 2010 and 2011 on a different vehicle. The earlier work demonstrated the ability to compromise a vehicle remotely, over multiple wireless channels (including cellular), and the ability to remotely control critical components on the vehicle post-compromise, including the telematics unit and the car's brakes. While the earlier academic work was publicly visible, both in peer-reviewed scholarly publications and in the press, the Miller and Valesek work received even greater public visibility.


Security measures

The increasing complexity of devices and networks in the automotive context requires the application of security measures to limit the capabilities of a potential attacker. Since the early 2000 many different countermeasures have been proposed and, in some cases, applied. Following, a list of the most common security measures: * Sub-networks: to limit the attacker capabilities even if he/she manages to access the vehicle from remote through a remotely connected ECU, the networks of the vehicle are divided in multiple sub-networks, and the most critical ECUs are not placed in the same sub-networks of the ECUs that can be accessed from remote. * Gateways: the sub-networks are divided by secure gateways or
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
s that block messages from crossing from a sub-network to the other if they were not intended to. *
Intrusion Detection Systems An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(IDS): on each critical sub-network, one of the nodes (ECUs) connected to it has the goal of reading all data passing on the sub-network and detect messages that, given some rules, are considered malicious (made by an attacker). The arbitrary messages can be caught by the passenger by using IDS which will notify the owner regarding with unexpected message. *
Authentication protocol An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity ...
s: in order to implement authentication on networks where it is not already implemented (such as CAN), it is possible to design an authentication protocol that works on the higher layers of the ISO OSI model, by using part of the data payload of a message to authenticate the message itself. * Hardware Security Modules: since many ECUs are not powerful enough to keep real-time delays while executing encryption or decryption routines, between the ECU and the network it is possible to place a hardware security module that manages security for it. *Intrusion Detection and IT-forensic Measures: reactive measures that address basic weaknesses.


Legislation

In June 2020, the United Nations Economic Commission for Europe (UNECE)
World Forum for Harmonization of Vehicle Regulations The World Forum for Harmonization of Vehicle Regulations is a working party (WP.29) of the Inland Transport Committee (ITC) of the United Nations Economic Commission for Europe (UNECE). Its responsibility is to manage the multilateral Agreements ...
released two new regulations, R155 and R156, establishing "clear performance and audit requirements for car manufacturers" in terms of automotive cybersecurity and software updates.


Notes

{{Information security Automotive design Computer security