5.3 Attack Case Study
Below we present one case study to demonstrate how
the proposed security model can preserve the
dependable connection between vehicles and mobile
phones under Application Masquerading Attack. The
attackers can simply search for the applications that
can connect to the vehicle head unit, and download it
from Google Play. Through reverse engineering, they
can obtain the middleware API calls from the
application, as well as any confidential that the
application received from manufacturer cloud. With
such information, the attackers implement their own
application and pretend to be legitimate, but with
malicious logic that will leverage the middleware
APIs to manipulate the navigation functionality. With
our proposed security model, such attack is not
feasible. On one hand, the confidential received by
the mobile application contains its name, and is
signed by the manufacturer servers, which will be
detected by head unit middleware if modified by
attackers. On the other hand, the middleware SDK
extracts the application name from mobile phone
system directly, to check the ownership of the
confidential. In the scenario of this attack, mismatch
will be detected and the corresponding API calls from
the malicious application will be denied.
6 CONCLUSIONS
In this paper, we present a novel security model that
can initiate dependable connection between vehicle
systems and smartphones. In particular, such model
incurs minimal burden on mobile application
developers, and negligible communication overhead.
Our analysis and comparison with the existing
methods demonstrate that the proposed model is
effective in defeating most of the security threats that
are introduced by the new communication channel
between vehicle systems and smartphones.
REFERENCES
Developer.gm.com, 2017. Next Generation Infotainment.
[online] Available at: https://developer.gm.com/ngi.
Npr.org, 2012. Ford enables voice control of NPR app
delivering in-car, On-demand access to news, programs
and stations. [online] Available at: http://www.npr.org/
about/press/2012/010912.NPRAnnouncesFordSYNC.
html.
Miller, S. and Valasek, C. 2013. Remote Exploitation of an
Unaltered Passenger Vehicle, [online] Available at:
http://illmatics.com/Remote%20Car%20Hacking.pdf.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H. and Savage S. 2010. Experimental
security analysis of a modern automobile. IEEE
Symposium on Security and Privacy, pp. 447–462.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, A. and Kohno, T. 2011. Comprehensive
experimental analyses of automotive attack surfaces.
USENIX conference on Security.
Hyundaiusa.com, 2017. Hyundai Blue Link | 3 Years Free
on Eligible 2018 Models. [online] Available at:
https://www.hyundaiusa.com/bluelink/index.aspx.
Yeung, J., Makke, O., MacNeille, P. and Gusikhin, O. 2017.
SmartDeviceLink as an Open Innovation Platform for
Connected Car Features and Mobility Applications.
SAE Int. J. Passeng. Cars – Electron. Electr. Syst.
10(1):231-239.
Onstar.com, 2017. Home | OnStar. [online] Available at:
https://www.onstar.com/us/en/home.html.
Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S.
2011. A Study of Android Application Security.
USENIX conference on Security.
Gitbub.com, 2017. iOS reverse engineering. [online]
Available at: https://github.com/iosre/iOSAppReverse
Engineering.
Viennot, N., Garcia, E. and Nieh, J. 2014. A Measurement
Study of Google Play, ACM SIGMETRICS.
Han, J., Mon Kywe, S., Yan, Q., Bao, F., Deng, R., Gao,
D., Li, Y., and Zhou, J. 2013. Launching Generic
Attacks on iOS with Approved Third-Party
Applications, ACNS.
Wang, K., Zhang, Y. and Liu, P. 2016. Call Me Back!
Attacks on System Server and System Apps in Android
through Synchronous Callback. ACM CCS.
Zhou, X., Lee, Y., Zhang, N., Naveed, M. and Wang, X.
2014. The peril of fragmentation: Security hazards in
android device driver customizations. IEEE S&P.
Wang, T., Lu, K., Lu, L., Chung, S. and Lee, W. 2013.
Jekyll on iOS: When Benign Apps Become Evil.
USENIX Security Symposium.
Chen, X., Garfinkel T., E. Lewis, C., Subrahmanyam, P.,
Waldspurger, C. A., Boneh, D., Dwoskin, J. and Ports
DRK. 2008. Overshadow: virtualization-based
approach to retrofitting protection in commodity
operating systems. ASPLOS.
Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. and
Jaeger, T. 2017. TrustShadow: Secure Execution of
Unmodified Applications with ARM TrustZone. ACM
Mobisys.
Github.com, 2017. smartdevicelink/sdl_core. [online]
Available at: https://github.com/smartdevicelink/
sdl_core.