The Current State of Automotive Security · 2020-07-08 · Title: Automotive Security: A Throwback...

Post on 13-Aug-2020

0 views 0 download

transcript

IOActive, Inc. Copyright ©2014. All Rights Reserved.

The Current State

of Automotive Security

Chris Valasek

Director of Vehicle Security Research

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Introduction

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Hello

• Chris Valasek• Director of Vehicle Security

Research• BS in CS from Pitt (2005)• Reverse engineer, Exploitation

research, Automotive security

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Agenda

• External perspective

• Concerns and correlations

• Desired advancements

• Q & A

IOActive, Inc. Copyright ©2014. All Rights Reserved.

My Perspective

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Years of Research

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Tools, Analysis, Methods

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Outsider’s perspective

• The following presentation is from my perspective

– There’s a chance some issues are being resolved

• Regardless, I think outside assessments are valuable

– Example: Proof reading

http://www.carthrottle.com/post/gangs-are-stealing-17-luxury-cars-every-day-in-london-by-hacking-the-keyless-entry-system/

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Concerns

IOActive, Inc. Copyright ©2014. All Rights Reserved.

My Concerns

• Revolve around physical safety and remote exploitation

• Worried about remote wireless => ECU compromise

– As opposed to insider threats

• I think privacy is important, but I focus on physical safety

• Outsider threats to cars are difficult to cash in on, so I’ll talk

on physical controls

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Concerns: Bus Systems

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Bus communications I

• CAN: Invented before vehicle connectivity was even a thing• Trust issues

• Ethernet• Expensive

• Complications

• Fragmentation, out of order, etc

• Could have similar deficiencies as CAN

• Spoofing

• Broadcast communications

• Carry known diagnostic data

• Security limitations usually revolve around diagnostic routines• What about legitimate traffic?

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Bus communications II

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Bus communications III

• Remote compromise….

• Encryption• Keys will have to reside somewhere the attacker can acquire them

• Diagnostic software or ECU itself

• Authentication• Remote compromise will happen on a pre-authenticated ECU

• Authorization• Legitimate messages will most likely be authorized

• Example: Pre-Collision System messages

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Concerns: Connected Devices

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Interconnectivity

http://upload.wikimedia.org/wikipedia/commons/0/07/PandaBoard_described.png

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Familiar attack surface

http://www.akhbarelyoum.dz/ar/images/ghoughl__tttlk_altttbik_alkhas_bndham_Android_Auto_llsiarat.jpg

http://motorburn.com/wp-content/uploads/2014/03/Apple-CarPlay.jpg

http://blogs-images.forbes.com/andygreenberg/files/2014/07/screen-shot-2013-02-05-at-7-35-23-pm-1024x547.png

IOActive, Inc. Copyright ©2014. All Rights Reserved.

1-to-N

• Windows does not come

with a VPN to Redmond,

your vehicle does

• Owning 1 internal asset

may lead to N

compromised vehicles

http://electronicdesign.com/site-files/electronicdesign.com/files/uploads/2013/05/0606_Onthesafeside_fig3.gif

IOActive, Inc. Copyright ©2014. All Rights Reserved.

No carrier restrictions

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Bad at secure coding

https://www.youtube.com/watch?v=LuWKXsteTNY

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Concerns: Architecture

IOActive, Inc. Copyright ©2014. All Rights Reserved.

OBD-II connectivity

http://cdn2-

b.examiner.com/sites/default/files/styles/image_content_width/hash/95/b7/95b774c969717ef38e9d

b8e54b2404c1.jpg?itok=e0nlongg

IOActive, Inc. Copyright ©2014. All Rights Reserved.

More data, more problems

http://www.zdnet.com/article/fords-big-data-experiments-can-it-transform-the-company/

http://vehicle-electronics.biz/sites/default/files/field/image/redbend.jpg

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Desired Advancements

IOActive, Inc. Copyright ©2014. All Rights Reserved.

VSDL

http://blogs-images.forbes.com/tonybradley/files/2014/03/Memo1.png

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Patching

IOActive, Inc. Copyright ©2014. All Rights Reserved.

IDS / IPS

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Conclusions• Let’s admit things are possible and there is a problem

• A breach is bad for everyone, not just the specific vendor

• Hard to justify security when there is no immediate threat

– MSFT 2006 v. MSFT 2014

– Server v. Client side

• Vehicle security is even harder than regular software security

– And more scrutinized

– People are concerned due to the possibility of physical harm

– We need to work together to improve the products we all use

• V2V will bring additional complications

• Patching is a HUGE problem right now

– OTA updates will help address the issue

• I’m Chris and I’m here to help!

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Q&A

IOActive, Inc. Copyright ©2014. All Rights Reserved.

Thanks!

• Chris Valasek• Director of Vehicle Security Research | IOActive• chris.valasek@ioactive.com