Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

Similar documents
Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Secure Product Design Lifecycle for Connected Vehicles

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

13W-AutoSPIN Automotive Cybersecurity

The case for a Vehicle Gateway.

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

MASP Chapter on Safety and Security

Development of Intrusion Detection System for vehicle CAN bus cyber security

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Click ISO to edit Master title style Update on development of the standard

Securing the Autonomous Automobile

KPIT S Connected Vehicle Practice

DOT/DHS: Joint Agency Work on Vehicle Cyber Security

Security

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Trusted Platform Modules Automotive applications and differentiation from HSM

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Securing the future of mobility

PREEvision Technical Article

Security Challenges with ITS : A law enforcement view

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

Real-time Communications Security and SDN

Medical Device Cybersecurity: FDA Perspective

Innovation policy for Industry 4.0

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010

Security and Privacy in Car2Car Adhoc Networks

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

to Address Cyber Physical Systems Security (CPSSEC)

National Institute of Standards and Technology

Validated P2PE for Reduced Compliance Scope, More Peace-of-Mind

Voertuigconstructeurs en data economie

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

OBD Simulator. Software to simulate and re-play a vehicle.

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

CANSPY A Platform for Auditing CAN Devices

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

Automotive Security Standardization activities and attacking trend

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석

Defining cybersecurity.

Security Concerns in Automotive Systems. James Martin

Internet of Things Security standards

ENISA s Position on the NIS Directive

Cybersecurity for Automobiles: BlackBerry s 7-Pillar Recommendation

Autonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma

Turbocharging Connectivity Beyond Cellular

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Automating the Top 20 CIS Critical Security Controls

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Verizon Software Defined Perimeter (SDP).

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Quo Vadis SAE J1939 Standardization

Automotive Security: Challenges and Solutions

Certified Cyber Security Specialist

Procurement Language for Supply Chain Cyber Assurance

Automotive Cybersecurity: A steep learning curve

Road vehicles Communication between vehicle and external equipment for emissions-related diagnostics. Part 5: Emissions-related diagnostic services

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

NCUA IT Exam Focus. By Tom Schauer, Principal CliftonLarsonAllen

J1939 Communication Driver

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

IC32E - Pre-Instructional Survey

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

Copyright 2017 Ford Motor Company, All Rights Reserved

Protect Your Organization from Cyber Attacks

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Cloud Customer Architecture for Securing Workloads on Cloud Services

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

SGS CYBER SECURITY GROWTH OPPORTUNITIES

MotoHawk support for ISO 15765

SURFACE VEHICLE RECOMMENDED PRACTICE

Examining future priorities for cyber security management

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

ProCurve Network Immunity

ISAO SO Product Outline

Security Principles for Stratos. Part no. 667/UE/31701/004

The GenCyber Program. By Chris Ralph

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

Network analysis and automotive diagnostics

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

EB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com

Package of initiatives on Cybersecurity

Transcription:

Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies

SAE INTERNATIONAL

SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based, process-driven approach to address the Cybersecurity threats the automotive environment is experiencing. Provides guidance on how to integrate cybersecurity into their product development lifecycle Establishes the desired relationships between cybersecurity and safety J3061 provides a foundation for further security standards development and is the go-to resource throughout industry SAE INTERNATIONAL 3

SAE and ISO Collaboration Enhancement of SAE J3061 SAE INTERNATIONAL 4

SAE INTERNATIONAL Paper # (if applicable) 5

6 ISO TC22/SC31/WG2/PT2 Draft document being developed for submission as a NWIP SAE INTERNATIONAL

7 New SAE J3005-2 draft Permanently or Semi-Permanently Installed Diagnostic Communication Devices- Security Guidelines Best practices for OBD-II interface and telematic devices for handling cyber security issues. Design and implement a secure firmware/software update process Secure product interfaces with authentication, integrity protection and encryption Obtain an independent security assessment of your product Secure the companion mobile applications and/or gateways that connect with your products (e.g., encryption/ privileges/authentication) Implement a secure root of trust for root chains and private keys on the device SAE INTERNATIONAL

SAE J3146 draft Industry practices related to securing the diagnostics interface to a vehicle (e.g. EU SERMI) SAE INTERNATIONAL 8

Secure Over The Air (SOTA) ECU software updates SAE INTERNATIONAL 9

US-NHTSA focus on OBD-II Security September 12: Letter from House Committee on Energy and Commerce to NHTSA RE: OBD-II Security request that NHTSA convene an industry-wide effort to develop a plan of action for addressing the risk posed by the existence of the OBD-II port in the modern vehicle ecosystem. September 28: NHTSA requests SAE to take the lead and convene industry group to examine issue October 14: NHTSA response to House Committee highlights SAE role: At NHTSA s urging, SAE International has started a working group that is looking to explore ways to harden the OBD-II port. This group is making good progress and the Agency remains hopeful that the group will move expeditiously to develop a set of recommendations. SAE INTERNATIONAL 10

11 SAE Data Link Connector (DLC) Vehicle Security Recommend Practice SAE J3138 draft Definition of Hardened OBD-II Port Firewall function recommendations for the DLC ECU security recommendations for data link connections Still allow required communications per vehicle emissions regulations SAE INTERNATIONAL

SAE J3138 The vehicle should be in a safe state prior to an intrusive OBD Service Request operation SAE INTERNATIONAL 12

SAE J3138 Validation Testing SAE J3138 specifies that the vehicle to be in a Safe State (e.g. stopped) for OBD-II communications. Validation Test Before starting OBD-II test the tools checks that vehicle speed is zero If not zero, the test aborts the test sequence However, a defect/malicious actor could try to trick the test By injecting a false vehicle speed of zero before the actual vehicle speed message Thereby tricking (spoofing) the test to continue SAE INTERNATIONAL 13

BEACON J3138 Test Utility The DG BEACON J3138 test utility allows the user to easily build and execute test sessions through a web page interface The user can easily construct OBD-II request and response messages The user can add padding and extra data bytes to the message definition SAE INTERNATIONAL 14

SAE INTERNATIONAL 15

Utilities Web Page

J3138 Web Interface Define Trigger Define Response Create Test In this example, the trigger is SID 1 PID 0D, which is vehicle speed The false response is speed data is 0

Test Created Start Test Request header is 07DF, data is 02 01 0D Response header 07E9, data is 03 41 0D 00

The log Received below Trigger shows that CAN channel 1 received the trigger message, and the test transmitted the false response within 3.5 milliseconds, would come before a real response Test Complete False response Possible real response

Other Features PCI Byte Click start again to start the test again Click J3138 button to start over and define a new test User can show and change PCI byte Show PCI PCI Byte

Other Features - Padding User can show and change pad Include & Show padding Padding example Message padding Change padding

Autonomous J3138 Testing with Datalogging Vehicle / Test Bench 2 Vehicle / Test Bench 1 Data Monitoring OBD Diagnostic ECU Control Variables Emission Sensor signals Data Logging Adapter Rugged construction Proven technology Advanced test management Display/Keypad Real-time Display of key parameters Field Operation control Central Test Management Remote operation Multiple test bed control Test set up, configuration Data management Data Visualization Real-time dashboards Analytics Test parameter optimization 22

J3138 Autonomous Datalogger Cloud Data Example 23 23

Additional Cyber Test Utilities Denial of Service (DOS) Overloading CANbus(s) with message traffic Fuzzing Allows the user to check the performance of an ECU or network in the presence of repeated and varied malformed CAN Bus messages Data value fuzzing (e.g. Boofuzz) Hardware fuzzing: Creation of malformed CAN Bus messages (incorrect data bits, incorrect stuff bits, incorrect CRC) SAE INTERNATIONAL 24

Detection of unspecified Diagnostics Services ( open port scan ) Polling ECUs with UDS SID requests and recording responses SAE INTERNATIONAL 25

Additional integrated test system support Professional Cyber Security Test Tools Or, roll your own with opensource, SocketCAN interface SAE INTERNATIONAL 26

J3138 vehicle speed spoof test SAE INTERNATIONAL 27

Thank you! Mark Zachos mzachos@dgtech.com