Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units

Martin Salfer, Claudia Eckert

Abstract

Modern vehicles are controlled by an on-board network of ECUs (Electronic Control Units), which are specially designed computers that contain tightly tailored and customized software. Especially the trends for ECU connectivity and for semi-autonomous driver assistance functions may have an impact on passenger safety and require thorough security assessments, yet the ECU divergence strains those assessments. We therefore propose an easily automated, quantitative, probabilistic method and metric based on ECU development data and software flash images for the attack surface and vulnerability assessment automation. Our method and metric is designed for the integration into an (iterative) engineering process and the facilitation of code reviews and other security assessments, such as penetration tests. The automotive attack surface comprises especially internal communication interfaces, including diagnosis protocols, external and user-accessible interfaces, such as USB sockets, as well as low-level hardware interfaces. Some exemplary indicators for the vulnerability are access restrictions, casing tamper-resistance, code size, previously found vulnerabilities; strictness of compilers, frameworks and application binary interfaces; conducted security audits and deployed exploit mitigation techniques. This paper’s main contributions are I) a method and a metric for collecting attack surface and predicting the engineering effort for a code injection exploit from ECU development data and II) an application of our metric and method into our graph-based security assessment.

References

  1. Alhazmi, O., Malaiya, Y., and Ray, I. (2005). Security vulnerabilities in software systems: A quantitative perspective. In Data and Applications Security XIX, number 3654 in Lecture Notes in Computer Science, pages 281-294. Springer Berlin Heidelberg.
  2. Alhazmi, O. H., Malaiya, Y. K., and Ray, I. (2007). Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & Security, 26(3):219-228.
  3. Charlie Miller and Chris Valasek (2014). A survey of remote automotive attack surfaces.
  4. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., and Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 2011 Usenix Security.
  5. Damm, W., Achatz, R., Beetz, K., Broy, M., Daembkes, H., Grimm, K., and Liggesmeyer, P. (2010). Nationale roadmap embedded systems. In Broy, M., editor, Cyber-Physical Systems, acatech DISKUTIERT, pages 67-136. Springer Berlin Heidelberg.
  6. Francillon, A., Danev, B., and Capkun, S. (2010). Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of NDSS.
  7. Howard, M., Pincus, J., and Wing, J. M. (2005). Measuring relative attack surfaces. In Computer Security in the 21st Century, pages 109-137. Springer US.
  8. Ishtiaq Rouf, R. M., Mustafa, H., Travis Taylor, S. O., Xu, W., Gruteser, M., Trappe, W., and Seskar, I. (2010). Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In 19th USENIX Security Symposium, Washington DC, pages 11-13.
  9. Kayaalp, M., Ozsoy, M., Ghazaleh, N., and Ponomarev, D. (2014). Efficiently securing systems from code reuse attacks. IEEE Transactions on Computers, 63(5):1144-1156.
  10. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., and Savage, S. (2010). Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, pages 447-462.
  11. Manadhata, P. and Wing, J. (2011). An attack surface metric. IEEE Transactions on Software Engineering, 37(3):371-386.
  12. Roschke, S., Cheng, F., Schuppenies, R., and Meinel, C. (2009). Towards unifying vulnerability information for attack graph construction. In 12th International Conference on Information Security, ISC 2009, pages 218-233, Berlin, Heidelberg. Springer-Verlag.
  13. Schneier, B. (2012). The importance of security engineering. IEEE Security & Privacy, 10(5):88-88.
Download


Paper Citation


in Harvard Style

Salfer M. and Eckert C. (2015). Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 317-326. DOI: 10.5220/0005550003170326


in Bibtex Style

@conference{secrypt15,
author={Martin Salfer and Claudia Eckert},
title={Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={317-326},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005550003170326},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
SN - 978-989-758-117-5
AU - Salfer M.
AU - Eckert C.
PY - 2015
SP - 317
EP - 326
DO - 10.5220/0005550003170326