Security and Privacy in Automotive On-Board Networks Hendrik Schweppe
Total Page:16
File Type:pdf, Size:1020Kb
Security and privacy in automotive on-board networks Hendrik Schweppe To cite this version: Hendrik Schweppe. Security and privacy in automotive on-board networks. Networking and Internet Architecture [cs.NI]. Télécom ParisTech, 2012. English. NNT : 2012ENST0062. tel-01157229 HAL Id: tel-01157229 https://pastel.archives-ouvertes.fr/tel-01157229 Submitted on 27 May 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. ! !! ! ! ! 2012-ENST-062 EDITE ED 130 Doctorat ParisTech T H È S E pour obtenir le grade de docteur délivré par Télécom ParisTech présentée et soutenue publiquement par Hendrik SCHWEPPE le 8 novembre 2012 Sécurité et protection de la vie privée ! ! dans les systèmes embarqués automobiles ! ! ! ! ! ! ! Directeur de thèse : Yves ROUDIER ! ! Jury M. Erland JONSSON , Professeur, Chalmers, Göteborg, Suède Rapporteur T M. Jean-Marc ROBERT , Professeur, École de Technologie Supérieure, Québec, Canada Rapporteur M. Joaquin GARCIA-ALFARO , Maître de Conférences, Télécom SudParis, France Examinateur H M. Renaud PACALET , Directeur d’Études, Télécom ParisTech, Sophia-Antipolis, France Examinateur M. Panagiotis PAPADIMITRATOS , Professeur, KTH, Stockholm, Suède Examinateur È M. Yves ROUDIER , Maître de Conférences, EURECOM, Sophia-Antipolis, France Examinateur M. Benjamin WEYL , Docteur-Ingenieur, BMW Group, München, Allemagne Invité S E Télécom ParisTech Ecole de l’Institut Télécom – membre de ParisTech 46, rue Barrault – 75634 Paris Cedex 13 – Tél. + 33 (0)1 45 81 77 77 – www.telecom-paristech.fr Security and Privacy in Automotive On-Board Networks Thesis Hendrik C. Schweppe [email protected] Ecole´ Doctorale Informatique, T´el´ecommunication et Electronique,´ Paris ED 130 November 8, 2012 Advisor: Examiners: Prof. Dr. Yves Roudier Prof. Dr. Joaquin Garcia-Alfaro, EURECOM, Sophia-Antipolis T´el´ecom SudParis Prof. Renaud Pacalet, T´el´ecom ParisTech, Sophia-Antipolis Reviewers: Prof. Dr. Panagiotis Papadimitratos, Prof. Dr. Erland Jonsson, KTH, Stockholm Chalmers, Gothenburg Invitee: Prof. Dr. Jean-Marc Robert, Dr.-Ing. Benjamin Weyl, ETS, Qu´ebec BMW AG, Munich To Annette and my parents. Acknowledgements I would like to express my gratitude to the people who have helped me to pursue my Ph.D. studies. First and foremost, this is Prof. Dr. Yves Roudier, my di- recteur de th`ese , who always supported me with ideas, fruitful discussions and trusted me to oversee a large part of the research done in the EVITA project. My peer at BMW Forschung und Technik, Dr.-Ing. Benjamin Weyl is equally important: He was the driving force behind the project, and at the same time gave me many inspirations and ideas for the concepts of this thesis. Benjamin made it possible for me to visit BMW in the scope of the project, and to get to know the industrial side of research. Thank you. I also would like to thank the jury members and especially the reviewers of my thesis, Prof. Dr. Erland Jonsson and Prof. Dr. Jean-Marc Robert. The early feedback I received from Prof. Jonsson was very detailed and helpful. Furthermore I express my appre- ciation to my colleagues and friends at the EURECOM institute. My deepest gratitude belongs to my family and Annette, who continuously supported me at every hour of the day. Abstract In recent decades, vehicles have been equipped with an increasing number of electronic features and controllers. They have become a vital part of automo- tive architecture. This architecture consists of an internal network of micro- controllers and small computers, called Electronic Control Units ( ECU s). Such ECU s may be part of an entertainment system, which will interact with the driver, or they complement technical and mechanical systems such as power steering, brakes, or engine control. Every ECU is usually connected to one or more networks as well as a number of sensors and actuators. Vehicles have become multi-connected places: i) Entertainment systems al- low data to be retrieved directly from the internet, typically traffic conditions, weather or navigational information, ii) Increasingly consumer devices are being connected by wired and wireless interfaces in order to control vehicle functions or distribute multimedia content, iii) Assistance functions to augment traffic safety and efficiency are currently being standardized, allowing vehicles and in- frastructure units to communicate autonomously via dedicated radio channels. All of these new communication interfaces should be properly secured, as failure to do so could have severe consequences, such as loss of control over the vehicle or private data being accessed by third party applications, which could, for example, record conversations or track usage behavior. Recent security analyses show that current vehicle architectures are vulnerable to the above described threats. It has been shown that by exploiting implementation flaws, attackers can control the vehicle’s behavior from a device inside the car or even remotely. This dissertation focuses on securing in-vehicle networks. Historically, vehicle buses such as the Controller Area Network ( CAN ) were considered as isolated embedded systems. However, an effective isolation of on-board networks is difficult if not impossible to achieve with the rises of connectivity inside the vehicle for internal functions and, at the same time, for third party devices and internet services. Upcoming safety and assistance functions use Car-to-Car and Car-to-Infrastructure communication ( Car2X ). These assistance functions rely on remotely received data. It is imperative that these data are trustworthy. A high level of trust can only be achieved by securing the on-board platform as a whole, and by protecting both the integrity and the authenticity of network communication as well as software execution. v vi The main contributions of this thesis are i) an approach to securing the com- munication of in-vehicle networks, ii) an approach to applying dynamic data flow analysis to the distributed embedded applications of on-board networks, by using taint-tag tracking in order to detect and avoid malicious activities, iii) working prototypes for different aspects of the overall security problem, showing simulations and real-world results of the techniques developed in this thesis. The approach that is presented combines multiple mechanisms at different layers of the vehicular communication and execution platform. Cryptographic com- munication protocols are designed and implemented in order to authenticate data exchanged on the buses. Hardware Security Modules ( HSM s) are used to complement the actual microcontroller by providing a secure storage and by acting as a local root of trust. We distribute usage-restricted symmetric key material between HSM s. Their use is limited to certain functions, like generat- ing or verifying authentication codes. Thereby, they can be used asymmetrically for group-communication patterns. This is a common communication paradigm in automotive applications, in particular for distributing vehicle-wide signals. A proof of concept system has been implemented as part of this thesis, showing the feasibility of integrating security features on top of automotive buses and for use with Car2X communication. We simulated the behavior of a CAN network and compare our results for different network designs with data collected from a real vehicle and with simulations based on a Simulink toolkit. In order to account for untrusted program code, we use a distributed data flow tracking based approach for securing code execution on the ECU s of the automotive network. This means that a high level of trust can be placed in applications even when mechanisms, such as software review and applications signatures, fall short of the desired security levels, or cannot be applied at all. If this approach is taken then the use of applications of unknown origin along side those controlling critical functions becomes possible. In addition to plain policy rules, we use a declarative approach to represent the kind of data used on communication links. Binary instrumentation techniques are used to track data flows throughout the execution and between control units. For the Car2Car Communication Consortium Forum in November 2011, a part of the prototype implementations was integrated into two research vehicles to demonstrate an “Active Brake” safety scenario using secure in-vehicle and Car2X communication. It demonstrated the effectiveness and applicability of our com- munication security solution. Ph.D. Thesis — Hendrik C. Schweppe Zusammenfassung Die Entwicklungen und Neuerungen rund um das Automobil ist in den let- zten Jahren in zunehmendem Maße von elektronischen Funktionen und einer Ausweitung der Kommunikationsschnittstellen gepr¨agt. Durch die Zunahme an Schnittstellen ist das Automobil zu einem Knotenpunkt der Vernetzung gewor- den. Applikationen verarbeiten interne Fahrzeugdaten, Daten aus dem Internet und von Mobiltelefonen, sowie in Zukunft auch von anderen Fahrzeugen mithilfe der sogenannten Car2X Kommunikation. Durch Abh¨angigkeiten k¨onnen