SlideShare a Scribd company logo
Automotive Electronics
Internals and Security Implications

        Aanjhan Ranganathan
Some Facts

●   Radio was the first electronic system
●   Today, ~40 computers power your car.
●   ~20 million lines of code.
●   About 10 Km of wiring exists in a modern auto-
    mobile
●   And weighs ~100 Kg



                                                     2
Drive-by Code



           Car multimedia
                                                  Dynamic stability control

Auto-transmission control                            Instrument cluster
                                                    Airbag control

Engine management                              Anti-lock breaking system
                                               Tyre pressure monitor



                                               Diagnostics



    Body sensors/electronics

                                                                              3
ECU Module




             4
Network Bus Protocols


●   Controller Area Network (CAN)
●   Local Interconnect Network (LIN)
●   FlexRay
●   Media Oriented Systems Transport (MOST)




                                              5
Networking in an Auto



      ABS            CM
                             DIA
EM



            Dash
            Board
DS

                    IC       BE
      Air




                                   6
Networking in an Auto




     EM           ABS                CM         DIA


                        Dash
High Speed Network              Low Speed Network
                        Board


DS          Air                 IC         BE




                                                      7
Car ECUs going wireless?




     EM         ABS                CM        DIA


                      Dash
                      Board


DS        Air                 IC        BE




                                                   8
*
         Tyre Pressure Monitoring System

                                  315 or 433 MHz
                                    ASK or FSK




                                    Dash
                                    Board




* Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring
 System Case Study, Rouf et al. Usenix Security 2010.                                            9
*
                     Security Analysis of TPMS
   ●   Difficulty of reverse engineering
          –   Using GNU Radio, Matlab, USRP
          –   Few days (experienced engineer) to few weeks (newbie)
   ●   Sniffing feasibility
          –   40 m range
          –   110 sniffers if the car is travelling at 60 Kmph
          –   Easier to trigger at 125 Khz
   ●   Spoofing feasibility
          –   Ability to trigger the TPMS monitor light
          –   No packet authentication
   ●   Security measures
          –   Reliable software design
          –   Encrypting the whole packet




* Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring
 System Case Study, Rouf et al. Usenix Security 2010.                                            10
Controller Area Network

●   Developed by Bosch
●   2-wire serial bus
●   No limitations on the #nodes
●   Message oriented protocol, no node addressing
●   Broadcast and multicast support
●   Physical and data link layer
●   Speed upto 1 Mbps

                                                    11
CAN Bus Characteristics

●   Wired-AND
       –   “0” is dominant bit
       –   “1” is recessive bit
●   All nodes read-back the data on the bus once
    they have transmitted a bit. Specifically during
    the arbitration phase.




                                                       12
CAN – CSMA with CD/CR
    Arb

    Data




X


A           1   0   0   ...



B           1   1                    1   1         ...


C           1   0   1                1   0   ...




                              time
                                                         13
CAN – Error Handling


●   Error Handling
●   Fault confinement
●   High speed and low speed nodes




                                     14
FlexRay

●   Time based scheduling (TDMA)
●   Deterministic behaviour
●   2 channels
●   10 Mbps on each channel => 20 Mbps
●   Complex protocol stack
●   Supports multiple network topology
●   Not YET in use widely

                                         15
Local Interconnect Network (LIN)

●   Slow (<20 Kbps) and used for less critical ECUs
●   UART/SCI based
●   Master – slave
●   Less expensive than CAN controllers
●   1-wire, reduced harness complexity




                                                      16
Media Oriented System Transport (MOST)

●   Physical layer – Mostly optical fibres
●   Upto 24 Mbps
●   Ring, star, daisy chain topologies possible
●   Audio, video streaming applications




                                                  17
Car Multimedia

●   No longer just radio
●   Navigation, phone handling, video, audio,
    interactive vehicle status updates and a lot
    more




                                                   18
Car Multimedia (contd..)




                           19
In Summary




             20
Diagnostics

●   Identifying faults
●   OBD II (On-Board Diagnostics v2.0 is the
    current standard)
●   Over CAN
●   Simple OBD-II scanners to high-end OBD-II
    diagnostic tools




                                                21
OBD II Systems




                 22
Other Interfaces to OBDII




                            23
Mobile Applications
DevToaster
                                   Torque




                                            24
1
                  Security Challenges in CAN

    ●   No security i.e. encryption/decryption defined
    ●   Broadcast nature
    ●   No node authentication
    ●   Limited defense to denial of service attacks
    ●   Re-programing and reset (C/R based auth)
    ●   Open diagnostic control



[1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10
                                                                                                          25
1
                       Security Analysis Setup




                          CarShark




[1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10
                                                                                                          26
1
                                Security Analysis

    ●   Deviations from standards
              –   Network segregation, command filtering, firmware
                  updates
    ●   Radio, cluster, body electronics control
    ●   Engine and brake control
    ●   Code injection




[1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10
                                                                                                          27
1
                                Security Analysis




[1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10
                                                                                                          28
1
                                Security Analysis




[1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10
                                                                                                          29
Manufacturer's Point of View
“While we sincerely respect the opinions of the researchers, we also
strongly believe their study makes conclusions which are based on
limited knowledge, and in some cases, are incorrect.”
                                                 Schader Electronics

                         "The car described in the US paper certainly was not one of ours.
                         We definitely use better than 16 bit encryption schemes."
                                                                                    BMW


"This gives any attacker an advantage and raises the need for a
solution which can uphold its level of security for such a long period
while new attacks are being developed"
                                                          Secunet AG


                               "This problem lies within the responsibility of the OEMs"
                                                                                Autosar



                                                                                             30
Conclusion

●   Moore's law shall be applicable to automobiles.
●   Not many care for privacy/vehicle tracking. Not
    necessary to be so sophisticated for this.
●   Security is a concern. Especially when it comes
    to losing your car/wallet.
●   Considerable change in infrastructure required.
●   Security issues bound to increase with
    increasing electronics and code.

                                                      31
Thank You




            32

More Related Content

PPSX
PDF
Mobile Video Architecture project
PPTX
Webinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriais
PDF
ComNet CNVETX1 Data Sheet
PPT
Gsm based m2 m system design & implementation using p soc
PPT
17 october embedded seminar
PDF
2FindMe Features
PDF
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
Mobile Video Architecture project
Webinar: BlueNRG-LP - Bluetooth 5.2 de longo alcance para aplicações industriais
ComNet CNVETX1 Data Sheet
Gsm based m2 m system design & implementation using p soc
17 october embedded seminar
2FindMe Features
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic

What's hot (20)

PPTX
An Introduction to Draganflyer X8 UAV
PDF
Webinar Embarcados: BLE MESH
PDF
Tablet in 2012
PPTX
Webinar: Nova família de microcontroladores STM32WL – Sub Giga Multiprotocolo
PPT
Introducing OMAP-L138/AM1808 Processor Architecture and Hawkboard Peripherals
PDF
LayerZero Series 70 ePODs: Type-N Static Transfer Switch with Distribution
PPTX
Mobile Devices - Product presentation 2012
PDF
Unizen defense case_studies_19aug16
PPTX
Why ip060810
PDF
Ms 9200 udls(e)
PDF
Fire Lite Ms 9200 Udls
PDF
Trackguard WTS brochure
PDF
Hiperlink optical 05 Ghz-lanrtx
PPT
Rf technology 5-8-2011-final-revised
PDF
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
PDF
FPGA Camp - National Instruments Presentation
PDF
Nemo outdoor-6-0-manual
PPT
NI Compact RIO Platform
PPSX
Mdvr H264
PPT
Multicast tutorial v3
An Introduction to Draganflyer X8 UAV
Webinar Embarcados: BLE MESH
Tablet in 2012
Webinar: Nova família de microcontroladores STM32WL – Sub Giga Multiprotocolo
Introducing OMAP-L138/AM1808 Processor Architecture and Hawkboard Peripherals
LayerZero Series 70 ePODs: Type-N Static Transfer Switch with Distribution
Mobile Devices - Product presentation 2012
Unizen defense case_studies_19aug16
Why ip060810
Ms 9200 udls(e)
Fire Lite Ms 9200 Udls
Trackguard WTS brochure
Hiperlink optical 05 Ghz-lanrtx
Rf technology 5-8-2011-final-revised
Webinar: Tecnologia LoRa – Do dispositivo à nuvem
FPGA Camp - National Instruments Presentation
Nemo outdoor-6-0-manual
NI Compact RIO Platform
Mdvr H264
Multicast tutorial v3
Ad

Similar to Automotive Electronics - Internals and Security Implications (20)

DOCX
thesis paper
PDF
Wolf etal securebus kom syst
PDF
Can Appl
PDF
I Car2.0
PPT
Automotive electronics Systems by Ravikumar Chilmula
PPTX
Controller area network (can bus)
PDF
Vehicular_Networking_Slides.pdf
PDF
Electric_Electronic_Architecture
PDF
Session 69 Cees de Wijs
PDF
IRJET- Data Acquistion through Connectivities in Cars
PDF
IRJET- Data Acquistion through Connectivities in Cars
PPTX
Controller Area Network (CAN) Different Types
PDF
The Current State of Automotive Security by Chris Valasek
PPTX
Embedded Systems in Automobile
PDF
In‐Vehicle Networking: a Survey and Look Forward
PDF
In-Vehicle Networking : a Survey and Look Forward
PDF
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
PDF
Embedded Systems in Automotive
PDF
Gentlemen, Start Your Engines 20120514
thesis paper
Wolf etal securebus kom syst
Can Appl
I Car2.0
Automotive electronics Systems by Ravikumar Chilmula
Controller area network (can bus)
Vehicular_Networking_Slides.pdf
Electric_Electronic_Architecture
Session 69 Cees de Wijs
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
Controller Area Network (CAN) Different Types
The Current State of Automotive Security by Chris Valasek
Embedded Systems in Automobile
In‐Vehicle Networking: a Survey and Look Forward
In-Vehicle Networking : a Survey and Look Forward
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
Embedded Systems in Automotive
Gentlemen, Start Your Engines 20120514
Ad

Automotive Electronics - Internals and Security Implications

  • 1. Automotive Electronics Internals and Security Implications Aanjhan Ranganathan
  • 2. Some Facts ● Radio was the first electronic system ● Today, ~40 computers power your car. ● ~20 million lines of code. ● About 10 Km of wiring exists in a modern auto- mobile ● And weighs ~100 Kg 2
  • 3. Drive-by Code Car multimedia Dynamic stability control Auto-transmission control Instrument cluster Airbag control Engine management Anti-lock breaking system Tyre pressure monitor Diagnostics Body sensors/electronics 3
  • 5. Network Bus Protocols ● Controller Area Network (CAN) ● Local Interconnect Network (LIN) ● FlexRay ● Media Oriented Systems Transport (MOST) 5
  • 6. Networking in an Auto ABS CM DIA EM Dash Board DS IC BE Air 6
  • 7. Networking in an Auto EM ABS CM DIA Dash High Speed Network Low Speed Network Board DS Air IC BE 7
  • 8. Car ECUs going wireless? EM ABS CM DIA Dash Board DS Air IC BE 8
  • 9. * Tyre Pressure Monitoring System 315 or 433 MHz ASK or FSK Dash Board * Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, Rouf et al. Usenix Security 2010. 9
  • 10. * Security Analysis of TPMS ● Difficulty of reverse engineering – Using GNU Radio, Matlab, USRP – Few days (experienced engineer) to few weeks (newbie) ● Sniffing feasibility – 40 m range – 110 sniffers if the car is travelling at 60 Kmph – Easier to trigger at 125 Khz ● Spoofing feasibility – Ability to trigger the TPMS monitor light – No packet authentication ● Security measures – Reliable software design – Encrypting the whole packet * Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, Rouf et al. Usenix Security 2010. 10
  • 11. Controller Area Network ● Developed by Bosch ● 2-wire serial bus ● No limitations on the #nodes ● Message oriented protocol, no node addressing ● Broadcast and multicast support ● Physical and data link layer ● Speed upto 1 Mbps 11
  • 12. CAN Bus Characteristics ● Wired-AND – “0” is dominant bit – “1” is recessive bit ● All nodes read-back the data on the bus once they have transmitted a bit. Specifically during the arbitration phase. 12
  • 13. CAN – CSMA with CD/CR Arb Data X A 1 0 0 ... B 1 1 1 1 ... C 1 0 1 1 0 ... time 13
  • 14. CAN – Error Handling ● Error Handling ● Fault confinement ● High speed and low speed nodes 14
  • 15. FlexRay ● Time based scheduling (TDMA) ● Deterministic behaviour ● 2 channels ● 10 Mbps on each channel => 20 Mbps ● Complex protocol stack ● Supports multiple network topology ● Not YET in use widely 15
  • 16. Local Interconnect Network (LIN) ● Slow (<20 Kbps) and used for less critical ECUs ● UART/SCI based ● Master – slave ● Less expensive than CAN controllers ● 1-wire, reduced harness complexity 16
  • 17. Media Oriented System Transport (MOST) ● Physical layer – Mostly optical fibres ● Upto 24 Mbps ● Ring, star, daisy chain topologies possible ● Audio, video streaming applications 17
  • 18. Car Multimedia ● No longer just radio ● Navigation, phone handling, video, audio, interactive vehicle status updates and a lot more 18
  • 21. Diagnostics ● Identifying faults ● OBD II (On-Board Diagnostics v2.0 is the current standard) ● Over CAN ● Simple OBD-II scanners to high-end OBD-II diagnostic tools 21
  • 25. 1 Security Challenges in CAN ● No security i.e. encryption/decryption defined ● Broadcast nature ● No node authentication ● Limited defense to denial of service attacks ● Re-programing and reset (C/R based auth) ● Open diagnostic control [1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10 25
  • 26. 1 Security Analysis Setup CarShark [1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10 26
  • 27. 1 Security Analysis ● Deviations from standards – Network segregation, command filtering, firmware updates ● Radio, cluster, body electronics control ● Engine and brake control ● Code injection [1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10 27
  • 28. 1 Security Analysis [1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10 28
  • 29. 1 Security Analysis [1] Experimental Security Analysis of a Modern Automobile, Koscher et al. IEEE Security and Privacy '10 29
  • 30. Manufacturer's Point of View “While we sincerely respect the opinions of the researchers, we also strongly believe their study makes conclusions which are based on limited knowledge, and in some cases, are incorrect.” Schader Electronics "The car described in the US paper certainly was not one of ours. We definitely use better than 16 bit encryption schemes." BMW "This gives any attacker an advantage and raises the need for a solution which can uphold its level of security for such a long period while new attacks are being developed" Secunet AG "This problem lies within the responsibility of the OEMs" Autosar 30
  • 31. Conclusion ● Moore's law shall be applicable to automobiles. ● Not many care for privacy/vehicle tracking. Not necessary to be so sophisticated for this. ● Security is a concern. Especially when it comes to losing your car/wallet. ● Considerable change in infrastructure required. ● Security issues bound to increase with increasing electronics and code. 31
  • 32. Thank You 32