Car Hacking Patrick, James, Penny.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Experimental Security Analysis of a Modern Automobile
Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Comprehensive Experimental Analyses of Automotive Attack Surfaces Authors: Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham,
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Car Operating Systems Ryan Benesky. The Beginning of Car Computers 1970s Was the beginning of the EPA and regulations to clean up the environment. In.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
August 7, 2003 Sensor Network Modeling and Simulation in Ptolemy II Philip Baldwin University of Virginia Motivation With.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Securing a Wireless Network
Caleb Walter. iPhone style charger Malware channel Exploit Vehicle CAN network Create Covert Channel at Public Charging Stations Custom Arduino CAN EVSE.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Layer 2 and Switching. How Computers Communicate  In a two node flat network data can be sent without addressing.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Ad Hoc Network.
Solving the Security Risks of WLAN Tuukka Karvonen
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
RV-ECU: Certifiable Runtime Verification for Automobiles Grigore Rosu
Security in Wireless Networks Mike Swift CSE b Summer 2003.
science/internet-intro
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Embedded system security
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Principles Identified - UK DfT -
Koji Nakao, Dai Arisue NICT, Japan
LAN Vulnerabilities.
Wireless Network Security
Security in Networking
COMPUTER PRIVACY.
The security and vulnerabilities of IoT devices
Security through Encryption
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
IIT Indore © Neminath Hubballi
Network and security trends in connected cars
Presentation transcript:

Car Hacking Patrick, James, Penny

What is…? What is a car? Why are there computers in cars? Why can something other than a car access these computers? We don’t know.

Not an Outline Internal Structure Exploits ECUs Controller Area Networks Seed to Key Algorithms Device Control Exploits Testing Methodology Attack Strategies Attack Results

Why is car hacking bad? Control car components remotely Physical implications Privacy concerns You won’t know about it afterwards most components, such as windscreen wipers, to brakes can be controlled by a computer our gps can be part of this network and have personal information on it like addresses it’s easy for an attacker to wipe all evidence of an attack from the system

Controller Area Network CAN: Controller Area Network ECU: Electronic Control Unit Car computers in general Comprised of 2 buses High speed bus: safety critical, more trusted Low speed bus: non-critical, convenience modules Required in all cars sold in US since 2008 required for diagnostics a gateway can route things between the buses

Here is a list of various ECUs and which bus each is connected to. Source: Article

CAN Security CAN packets: header that says where the packet goes No addresses used All packets broadcast physically and logically to all nodes Each node decides if it should process the packet Vulnerabilities: All nodes see all traffic All nodes communicate all other nodes DoS-able No identifiers Firmware updates Weak access controls that aren’t used many vulnerabilities, and on are common to most implementations because of the broadcast nature vulnerable to denial of service attacks Don’t know who sent a packet answers to standard challenges for authentication when doing sensitive things, like reflashing components, are stored in memory There are several protection mechanisms written into the protocol, but they are often ignored by ECUs, such as ignore disable communications command

Seed to Key Algorithms Authentication method for sensitive operations One ECU sends the seed (the challenge) The other replies with the key Each ECU has its own seed and key Keys and seeds are fixed and stored in the memory of each ECU Algorithms used to compute them are not stored in ECUs for “security” Return of challenge not always used Brute forcible keys The algorithm is the challenge and the response between the ecus, one ecu sends a packet requesting access to the protected resource the other responds with the challenge then the key Also, all nodes see all requests so you can sit on the network and see all keys and seeds passed

DeviceControl Essentially debuggers for cars Assists in diagnosis of a car’s components Examines state Manipulates state In operating systems debuggers are limited by access-control CANs do not have access-control

Testing Methodology Bench Stationary Car Car in motion CarShark Testing individual ECUs Stationary Car Car on jacks Car in motion Professional driver, closed course. Do not attempt. CarShark Bench: Working with individual ECUs. Setup involves an ECU either off the shelf or from a car, a CAN-to-USB connector, an oscilloscope, and a power supply Stationary Car: Similar tests conducted on ECUs in the car through the Onboard Diagnostics II port to determine the effects hacking the CAN can have. For safety purposes, the car was on jacks. Car in Motion: Testing the exploits in motion on the road to determine if there are any differences between stationary and in-motion effects. Testing was completed with a chase car with a wifi connection to a laptop plugged into the test car’s OBD-II port.

Source: Article CarShark - CAN bus analyser and packed injection tool. Needed to be adapted for proprietary packets in the Car’s CAN. Having a custom tool also added additional testing abilities.

Attack Vectors Packet Sniffing and Target Probing Fuzzing Analyze packets with CarShark Only sees normal operations Fuzzing Send random or partially random packets Useful for system disruption Exploit the DeviceControl service Reverse-Engineering Dump assembly code & analyze Adding new functionality Determine how ECUs communicate with each other. Perform many normal car operations (turn on the headlights, adjust the stereo, apply the brakes) Packets for safety-critical actions, such as SRS or ABS, are not visible normally with this approach Using packets picked up by the CarShark, determine the general format of the CAN packets of the vehicle Send random packets of the same format into the CAN Identified the small range of bytes that DeviceControl uses, and quickly determined what combinations control what Only needed for the most complex ECUs, such as the telematics unit Required to add functionality that is not available in any normal car operation, such as bridging buses

Non-Moving Car Testing I.E. Stationary Tested on all ECUs in the car Radio First ECU tested, easiest to exploit Disable user control Display arbitrary messages and play arbitrary sounds Brakes Fuzzing showed how to lock individual brakes as well as sets DeviceControl Key not needed Two arbitrary ECUs, there are plenty more. BUT we are able to release the brakes at speed

Non-Stationary Car Testing I.E. Moving Tested on ECUs that don’t affect the safety of the car or driver Exploits were transmitted from a chase car Cancellation packet sent after exploit is verified Laptop pulled from port if anything goes wrong Car functions return to normal shortly after laptop is removed Only difference was EBCM Also not enough allotted time at airport Laptop in test car plugged into OBD-II port and connects with chase car via local wifi EBCM: When stationary no DeviceControl authentication was required, but after 5 MPH, DeviceControl was needed to apply the breaks. Contrary to that, DeviceControl is not required to release the breaks or prevent the breaks from being applied while stationary or at speed.

Source: Article At speed means on jacks with wheels spinning at 40 On runway means actually tested while moving (some were too dangerous to try). Need to unlock refers to DeviceControl. Nothing on this table needed to be unlocked, but on other tables the Engine Control Module did need to be unlocked, and the Electronic Brake Control Module did not need to be unlocked when stationary, but did need to be unlocked when going more than 5 MPH

Issues Required (almost) physical access to car via OBD-II port Bluetooth Wireless Tire Pressure Sensors Given physical access an attacker could Cut breaks Set fire to car Place bomb in car OBD: On Board Diagnostics Not in paper: can be accessed through a bad CD

Future (to the paper) work Comprehensive Experimental Analyses of Automotive Attack Surfaces http://www.autosec.org/pubs/cars-usenixsec2011.pdf

You’re all engineers, fix it. [In] Conclusion Cars are insecure. You’re all engineers, fix it. Every electronic control unit in the cars in question was vulnerable to attack, and many of them were exploitable without DeviceControl authentication at speed. This was not limited to a specific car at the time, and is likely not limited to specific cars now. Some high-end luxury car makers such as BMW and Merc may be implementing more security measures, however.

Questions? Too bad. http://www.specialist-auto.fr/wp-content/files_uploads/2014/12/aston-martin-db10-bond-1.jpg

Defenses Prevent reflashing Signed firmware updates Disallow 3rd party components Preventing reflashing is unrealistic people may want to tune their car would require you to trust certain mechanics which ones do you trust Less extreme: prevent arbitrary ECUs from using reflashing commands Signed Firmware Updates 3rd Party components increase the attack surface One option is to have all communication from 3rd party components to go through a “secure” communicator The secure communicator will filter out bad commands What is a bad command?