SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
FFRI,Inc.

Monthly Research

Current state of
automotive network security
FFRI,Inc.
http://www.ffri.jp

Ver 2.00.01

1
FFRI,Inc.

Background
• Many electronic devices have been used by automobiles
• These devices are connected each other and communicate to
control automobiles
• Recent years, automotive network has been connected to
smartphones and the internet. It makes new threats turn up.
• This slides summarizes how automotive network security have
been and what is expected as incoming threats.

2
FFRI,Inc.

Automotive networks
• Contemporary automobiles consist of many electronic devices.
• Electronic controls are used in many parts of automobiles such
as engines, brakes and doors and they are connected each
other.
– They communicate each other and do proper controls
• Display current speed
• Locking a door and so on
• Representative automotive networks are CAN, LIN and
FlexRay

3
FFRI,Inc.

CAN (Controller Area Network)
• De facto standard of automotive networks
• It connects ECUs(Electronic Controller Unit) and provides
communication by broadcasting
• ODB-II port(for diagnostic use) can be used to access CAN
ECU
(Controlling a door)

ECU
(Controlling
lights)

ECU
(Controlling air
conditioner)

ECU
(…)

4
FFRI,Inc.

Reported problems about automotive networks 1
• In 2010, K. Koshcer at University of Washington published
“Experimental Security Analysis of a Modern Automobile”
– Shows practical security risks of CAN
– Accesses CAN via ODB-II
– DoS attack and rewriting memory on ECUs are feasible
– Shows threats such as faking speed meter, disable brakes
– Points out a possibility of malicious code injection into ECU

5
FFRI,Inc.

Reported problems about automotive networks 2
• In 2013 at DefCon21, Charlie Miller presented actual proof of
threats for automotive networks
– Presented concrete methods of analyzing CAN packets and
result of the analysis
• Ford Escape
• Toyota Prius are the actual targets
– Showed actual proof of stopping engines and rewriting
firmware

6
FFRI,Inc.

Problems and threats of CAN and ECU
• CAN is broadcast base protocol. It is easy to eavesdrop
communications
• CAN’s specification does not have an authentication process
• Arbitrary packet can be sent to ECU
• ECU do not have method to authenticate it
(However, diagnostic protocol (UDS) has an authentication
standard for ECU implementation)
• Rewriting ECU programs is possible

Trade-off against requirements for automotive networks such as
real-time processing, maintainability, cost

7
FFRI,Inc.

New threats
• Recent years, automotive network has been connected to
smartphones and the internet
• It is now more likely to happen malware attacking and remote
attack via smartphones
• Android devices connected to automotive and wireless
adaptors also have been appearing

Possibility to access automotive networks remotely

8
FFRI,Inc.

Proposed measures
•

Mainly 2 directions
– Making conventional network more secure
Example:
• Cyber-Security for the Controller Area Network (CAN)Communication Protocol
http://www.eecs.berkeley.edu/~cwlin/publications/40108_13.pdf
– Securing CAN communication itself. Make it possible to authenticate
packets between ECUs.
– New measures for new threats
Example:
• Towards a Secure Automotive Platform
http://www.secunet.com/fileadmin/user_upload/Download/Printmaterial/englisc
h/sn_Whitepaper_Secure_Automotive_Platform_E.pdf
– Access control to automotive network using ARM TrustZone
– Devices connected to automotive networks such as Android devices are the
target (Threats as an attack vector)
– Virtually switch CPU running Android and CPU communicates automotive
networks.
– No influence to automotive network when Android side has a problem

9
FFRI,Inc.

Summery
• Recent years, they point out the problems on CAN which is de
facto standard of automotive networks
• Currently there are actual proof of intrusion into CAN via ODBII port
• In future, it may be realized to the intrude as connection to
automotive networks from more smartphones and the internet
accelerates.
• It is proposed to secure network protocols (authentication,
tampering detection) and to make access control to
automotive network using TrustZone
• As more devices are connected to automotive networks, to
keep taking actions to new threats are required

10
FFRI,Inc.

References
•
•
•
•

•
•
•

•

車載ネットワーク・システム徹底解説 (佐藤道夫 CQ出版社 2005)
Experimental Security Analysis of a Modern Automobile
http://www.autosec.org/pubs/cars-oakland2010.pdf
Adventures in Automotive Networks and Control Units
http://www.exploit-db.com/download_pdf/27404/
2011年度自動車情報セキュリティの動向に関する調査
http://www.ipa.go.jp/files/000024413.pdf
2012年度自動車情報セキュリティの動向に関する調査
http://www.ipa.go.jp/files/000027274.pdf
組み込みシステムのセキュリティ~~自動車情報セキュリティの視点から~~
http://www.ipa.go.jp/files/000013557.pdf
Cyber-Security for the Controller Area Network (CAN) Communication
Protocol
http://www.eecs.berkeley.edu/~cwlin/publications/40108_13.pdf
Towards a Secure Automotive Platform
http://www.secunet.com/fileadmin/user_upload/Download/Printmaterial/engl
isch/sn_Whitepaper_Secure_Automotive_Platform_E.pdf

•11
FFRI,Inc.

Contact Information
E-Mail : research—feedback@ffri.jp
Twitter : @FFRI_Research

12

Mais conteúdo relacionado

Mais procurados

UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture Embitel Technologies (I) PVT LTD
 
Afc system overview
Afc system overviewAfc system overview
Afc system overviewshobhi1203
 
Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)ANUBHAVGHOSHDASTIDAR
 
FAQs’ for Unit, Integration and Functional Testing Services
FAQs’ for Unit, Integration and Functional Testing ServicesFAQs’ for Unit, Integration and Functional Testing Services
FAQs’ for Unit, Integration and Functional Testing ServicesEmbitel Technologies (I) PVT LTD
 
Project Report on automated toll tax collection system using rfid
Project Report on automated toll tax collection system using rfidProject Report on automated toll tax collection system using rfid
Project Report on automated toll tax collection system using rfidjeet patalia
 
Case study: M2M Telematics Solution - Happiest Minds
Case study: M2M Telematics Solution - Happiest MindsCase study: M2M Telematics Solution - Happiest Minds
Case study: M2M Telematics Solution - Happiest MindsHappiest Minds Technologies
 
IRJET- Automatic Engine Locking System through Alcohol Detection in Ardui...
IRJET-  	  Automatic Engine Locking System through Alcohol Detection in Ardui...IRJET-  	  Automatic Engine Locking System through Alcohol Detection in Ardui...
IRJET- Automatic Engine Locking System through Alcohol Detection in Ardui...IRJET Journal
 
Speed control of vehicle
Speed control of vehicleSpeed control of vehicle
Speed control of vehicleAmanVerma443
 
IRJET - Toll and Vehicle Rules Automation System
IRJET - Toll and Vehicle Rules Automation SystemIRJET - Toll and Vehicle Rules Automation System
IRJET - Toll and Vehicle Rules Automation SystemIRJET Journal
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded systemmanish katara
 
Understanding Flash Bootloader Software and Automotive ECU Reprogramming
Understanding Flash Bootloader Software and Automotive ECU ReprogrammingUnderstanding Flash Bootloader Software and Automotive ECU Reprogramming
Understanding Flash Bootloader Software and Automotive ECU ReprogrammingEmbitel Technologies (I) PVT LTD
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...theijes
 
Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Ganesh Bv
 
Presentation automatic speed controller
Presentation automatic speed controllerPresentation automatic speed controller
Presentation automatic speed controllerVikrant Verma
 
IRJET- Intelligent Braking System for Automobiles
IRJET- Intelligent Braking System for AutomobilesIRJET- Intelligent Braking System for Automobiles
IRJET- Intelligent Braking System for AutomobilesIRJET Journal
 

Mais procurados (20)

J1939 Stack Source Code
J1939 Stack Source CodeJ1939 Stack Source Code
J1939 Stack Source Code
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
 
ECU Reprogramming Software Service
ECU Reprogramming Software ServiceECU Reprogramming Software Service
ECU Reprogramming Software Service
 
Afc system overview
Afc system overviewAfc system overview
Afc system overview
 
Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)
 
What is OBD and OBD II Software Stack?
What is OBD and OBD II Software Stack?What is OBD and OBD II Software Stack?
What is OBD and OBD II Software Stack?
 
FAQs’ for Unit, Integration and Functional Testing Services
FAQs’ for Unit, Integration and Functional Testing ServicesFAQs’ for Unit, Integration and Functional Testing Services
FAQs’ for Unit, Integration and Functional Testing Services
 
Project Report on automated toll tax collection system using rfid
Project Report on automated toll tax collection system using rfidProject Report on automated toll tax collection system using rfid
Project Report on automated toll tax collection system using rfid
 
Case study: M2M Telematics Solution - Happiest Minds
Case study: M2M Telematics Solution - Happiest MindsCase study: M2M Telematics Solution - Happiest Minds
Case study: M2M Telematics Solution - Happiest Minds
 
Migration from CAN 2.0 to CAN FD
Migration from CAN 2.0 to CAN FDMigration from CAN 2.0 to CAN FD
Migration from CAN 2.0 to CAN FD
 
IRJET- Automatic Engine Locking System through Alcohol Detection in Ardui...
IRJET-  	  Automatic Engine Locking System through Alcohol Detection in Ardui...IRJET-  	  Automatic Engine Locking System through Alcohol Detection in Ardui...
IRJET- Automatic Engine Locking System through Alcohol Detection in Ardui...
 
Speed control of vehicle
Speed control of vehicleSpeed control of vehicle
Speed control of vehicle
 
IRJET - Toll and Vehicle Rules Automation System
IRJET - Toll and Vehicle Rules Automation SystemIRJET - Toll and Vehicle Rules Automation System
IRJET - Toll and Vehicle Rules Automation System
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
 
Understanding Flash Bootloader Software and Automotive ECU Reprogramming
Understanding Flash Bootloader Software and Automotive ECU ReprogrammingUnderstanding Flash Bootloader Software and Automotive ECU Reprogramming
Understanding Flash Bootloader Software and Automotive ECU Reprogramming
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...
 
Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234
 
Presentation automatic speed controller
Presentation automatic speed controllerPresentation automatic speed controller
Presentation automatic speed controller
 
CONTRIVIA
CONTRIVIACONTRIVIA
CONTRIVIA
 
IRJET- Intelligent Braking System for Automobiles
IRJET- Intelligent Braking System for AutomobilesIRJET- Intelligent Braking System for Automobiles
IRJET- Intelligent Braking System for Automobiles
 

Semelhante a Current state of automotive network security

Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfDorleControls
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Gilad Bandel
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car SecuritySuresh Mandava
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in TransportationOren Elimelech
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...CODE BLUE
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET Journal
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET Journal
 
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...Guy Boulianne
 
The AMIC Api's - OSGi in an Automotive Platform - E Nelson
The AMIC Api's - OSGi in an Automotive Platform - E NelsonThe AMIC Api's - OSGi in an Automotive Platform - E Nelson
The AMIC Api's - OSGi in an Automotive Platform - E Nelsonmfrancis
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismTyler Cragg
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 

Semelhante a Current state of automotive network security (20)

Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Wfcs2019
Wfcs2019Wfcs2019
Wfcs2019
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in Transportation
 
thesis paper
thesis paperthesis paper
thesis paper
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
How to Hack Your Mini Cooper. Reverse Engineering CAN Messages on Passenger A...
 
The AMIC Api's - OSGi in an Automotive Platform - E Nelson
The AMIC Api's - OSGi in an Automotive Platform - E NelsonThe AMIC Api's - OSGi in an Automotive Platform - E Nelson
The AMIC Api's - OSGi in an Automotive Platform - E Nelson
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 

Mais de FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) FFRI, Inc.
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...FFRI, Inc.
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)FFRI, Inc.
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) FFRI, Inc.
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShellFFRI, Inc.
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressFFRI, Inc.
 

Mais de FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Malwarem armed with PowerShell
Malwarem armed with PowerShellMalwarem armed with PowerShell
Malwarem armed with PowerShell
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPress
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Current state of automotive network security

  • 1. FFRI,Inc. Monthly Research Current state of automotive network security FFRI,Inc. http://www.ffri.jp Ver 2.00.01 1
  • 2. FFRI,Inc. Background • Many electronic devices have been used by automobiles • These devices are connected each other and communicate to control automobiles • Recent years, automotive network has been connected to smartphones and the internet. It makes new threats turn up. • This slides summarizes how automotive network security have been and what is expected as incoming threats. 2
  • 3. FFRI,Inc. Automotive networks • Contemporary automobiles consist of many electronic devices. • Electronic controls are used in many parts of automobiles such as engines, brakes and doors and they are connected each other. – They communicate each other and do proper controls • Display current speed • Locking a door and so on • Representative automotive networks are CAN, LIN and FlexRay 3
  • 4. FFRI,Inc. CAN (Controller Area Network) • De facto standard of automotive networks • It connects ECUs(Electronic Controller Unit) and provides communication by broadcasting • ODB-II port(for diagnostic use) can be used to access CAN ECU (Controlling a door) ECU (Controlling lights) ECU (Controlling air conditioner) ECU (…) 4
  • 5. FFRI,Inc. Reported problems about automotive networks 1 • In 2010, K. Koshcer at University of Washington published “Experimental Security Analysis of a Modern Automobile” – Shows practical security risks of CAN – Accesses CAN via ODB-II – DoS attack and rewriting memory on ECUs are feasible – Shows threats such as faking speed meter, disable brakes – Points out a possibility of malicious code injection into ECU 5
  • 6. FFRI,Inc. Reported problems about automotive networks 2 • In 2013 at DefCon21, Charlie Miller presented actual proof of threats for automotive networks – Presented concrete methods of analyzing CAN packets and result of the analysis • Ford Escape • Toyota Prius are the actual targets – Showed actual proof of stopping engines and rewriting firmware 6
  • 7. FFRI,Inc. Problems and threats of CAN and ECU • CAN is broadcast base protocol. It is easy to eavesdrop communications • CAN’s specification does not have an authentication process • Arbitrary packet can be sent to ECU • ECU do not have method to authenticate it (However, diagnostic protocol (UDS) has an authentication standard for ECU implementation) • Rewriting ECU programs is possible Trade-off against requirements for automotive networks such as real-time processing, maintainability, cost 7
  • 8. FFRI,Inc. New threats • Recent years, automotive network has been connected to smartphones and the internet • It is now more likely to happen malware attacking and remote attack via smartphones • Android devices connected to automotive and wireless adaptors also have been appearing Possibility to access automotive networks remotely 8
  • 9. FFRI,Inc. Proposed measures • Mainly 2 directions – Making conventional network more secure Example: • Cyber-Security for the Controller Area Network (CAN)Communication Protocol http://www.eecs.berkeley.edu/~cwlin/publications/40108_13.pdf – Securing CAN communication itself. Make it possible to authenticate packets between ECUs. – New measures for new threats Example: • Towards a Secure Automotive Platform http://www.secunet.com/fileadmin/user_upload/Download/Printmaterial/englisc h/sn_Whitepaper_Secure_Automotive_Platform_E.pdf – Access control to automotive network using ARM TrustZone – Devices connected to automotive networks such as Android devices are the target (Threats as an attack vector) – Virtually switch CPU running Android and CPU communicates automotive networks. – No influence to automotive network when Android side has a problem 9
  • 10. FFRI,Inc. Summery • Recent years, they point out the problems on CAN which is de facto standard of automotive networks • Currently there are actual proof of intrusion into CAN via ODBII port • In future, it may be realized to the intrude as connection to automotive networks from more smartphones and the internet accelerates. • It is proposed to secure network protocols (authentication, tampering detection) and to make access control to automotive network using TrustZone • As more devices are connected to automotive networks, to keep taking actions to new threats are required 10
  • 11. FFRI,Inc. References • • • • • • • • 車載ネットワーク・システム徹底解説 (佐藤道夫 CQ出版社 2005) Experimental Security Analysis of a Modern Automobile http://www.autosec.org/pubs/cars-oakland2010.pdf Adventures in Automotive Networks and Control Units http://www.exploit-db.com/download_pdf/27404/ 2011年度自動車情報セキュリティの動向に関する調査 http://www.ipa.go.jp/files/000024413.pdf 2012年度自動車情報セキュリティの動向に関する調査 http://www.ipa.go.jp/files/000027274.pdf 組み込みシステムのセキュリティ~~自動車情報セキュリティの視点から~~ http://www.ipa.go.jp/files/000013557.pdf Cyber-Security for the Controller Area Network (CAN) Communication Protocol http://www.eecs.berkeley.edu/~cwlin/publications/40108_13.pdf Towards a Secure Automotive Platform http://www.secunet.com/fileadmin/user_upload/Download/Printmaterial/engl isch/sn_Whitepaper_Secure_Automotive_Platform_E.pdf •11
  • 12. FFRI,Inc. Contact Information E-Mail : research—feedback@ffri.jp Twitter : @FFRI_Research 12