Eystein Stenberg
CTO
Mender.io
Securing the Connected Car
The software defined car
1990 2000 2010 2020
Hardware enabled Software enabled Software defined
Telematics Infotainment Connected
Assisted
driving
AutonomousElectronics
About me
● Eystein Stenberg
○ 7 years in systems security management
○ M. Sc., Computer Science, Cryptography
○ eystein@mender.io
● Mender.io
○ Over-the-air updater for Linux, Yocto Project
○ Open source (Apache License, v2)
○ Dual A/B rootfs layout (client)
○ Remote deployment management (server)
○ Under active development
Session overview
● Opportunities with the software defined car
● Anatomy of an attack: security risks of the
connected car
● The patching problem & solution designs
Software defined car: New revenue streams
● “Automakers could add up to $27.1B annually from services such as car
sharing and more” - Navigant Research
● Tesla
○ An OTA update system allows for easy additional software purchases after buyers drive
their cars off the lot
○ Semi-autonomous Autopilot feature allows current Model S owners to add the feature for
$2,500 USD when they order the vehicle or they can pay $3,000 USD to upgrade later
Cost savings by using open source platforms
IVI stack
Hardware
Board support pkg.
Operating system
Middleware
Apps
HMI
Cost
10%
30%
60%
Differentiation
Focus on
open source
here
● Lower layers are expensive and
provides no differentiation
● Use open source here to
○ Shorten time-to-market
○ Lower cost
○ Reallocate development
to differentiating features
OTA updater
The software defined car requires OTA updates
● Increased software complexity requires more frequent improvements
● “33% of current recalls are for problems that could be fixed OTA” - ABI Research
● “OTA updates will save carmakers $35B in 2022” - IHS Automotive
● Fiat Chrysler hack (next up) required a recall of 1.4 million vehicles that could have
been avoided with an OTA update
Jeep Cherokee hacked in July 2015
● Presented at Black Hat USA 2015
○ Charlie Miller
○ Chris Valasek
● Remote exploit giving full control
of the car
● Clearly demonstrates physical
safety risk
● No way to fix remotely
● 1.4 million cars recalled
● August 2016: Extended to
unauthorized ECU update via CAN
Jeep Cherokee Head Unit with Wifi
Wifi hotspot offered
as a service
● Cherokee customers can buy wifi
subscription as an add-on (~$40/month)
● Connect devices in the car to the car’s
wifi to get online (phones, tablets, …)
● Wifi is password protected
“Head unit”, “IVI”
Wifi-based breach: Short-range
● Wifi password based on system time after
provisioning
● January 01 2013 00:00 GMT +- 1 minute
● Multimedia system breached due to
software vulnerability
● Scope: Control music player/radio/volume
and track GPS coordinates when within
wifi range
Guessable
password
Software
vulnerability
Cellular-based breach: Country-wide
● Scope: Control music player/radio/volume
and track GPS coordinates countrywide
● Can also select a specific Jeep based on its
GPS-coordinates
Breach Sprint
Cellular network
Software
vulnerability
The Controller Area Network (CAN) bus
● The CAN bus connects ~70 electronic
control units (ECUs), including engine
control, transmission, airbags, braking
● V850 chip is designed to only read from the
CAN bus, to isolate components
V850 chip
Read-only
Diagnostics
CAN bus
● The head unit can update the firmware
of the V850
● Firmware update authenticity not
checked properly
V850 chip
Full control
Malicious firmware
update
Putting it together
Lessons
● Wifi hotspot password was predictable
● Remotely accessible service (in head unit)
was vulnerable (and not updated)
● Firmware update (for V850) did not have
proper authenticity checks
● The only way to fix the vulnerabilities is
through a manual update (by customer or
dealership)
FW update
Cellular breach
Vulnerability
More complexity leads to larger attack surface
● 1-25 bugs per 1000 lines of code*
○ Assume that all software components have vulnerabilities
● Rely on well-maintained software and keep it updated
○ Open source vs. proprietary is a red herring
○ Do not build all the software in-house
● Principle of least privilege
● Separation of privilege
● Kerckhoff’s principle
*Source: Steve McConnell, Code Complete
Security patching is done too late
60 days: >90% probability it is exploited
110 days: remediation time avg.
5-10 days: <10% probability it is exploited
Source: How the Rise in Non-Targeted Attacks Has Widened the Remediation Gap, Kenna Security
Why security patching happens too late
● The value is invisible until too late
● Too costly or risky
○ Manual? Too expensive to integrate updater?
○ Requires downtime of production? Risk of breaking production?
● Politics
● How often do you patch?
○ Do you have a way to do it? A process?
○ Often not a core competence and not a priority to develop updater
Patching connected devices is harder
● No/expensive physical access
○ Need failure management
● Unreliable power
○ What if power disappears in the middle of patching?
● Unreliable (wireless) network connectivity
○ Handle partial downloads
○ Ideally resume downloads in expensive networks like 3G
● Public and insecure (wireless) networks
○ Can someone inject arbitrary code during the update process?
○ Verify authenticity of update
Generic embedded updater workflow
Detect update
(secure channel)
Download
(secure channel)
Integrity
(e.g. checksum)
Authenticate
(e.g. signature)
DecryptExtract
Install
Failure recovery
(e.g. roll back)
Compatibility
check
Sanity checks
Post-install
actions
Pre-install
actions
Must-have
Environment-specific
Choose a
strategy
Choice of update type has tradeoffs
Full image Package (opkg, …) tar.gz Docker/Containers
Download size Large* Small Small Medium
Installation time Long* Short Short Short
Rollback Yes (dual partition) Hard Hard Yes
Consistency Yes Medium Hard Yes
Design impact Bootloader,
Partition layout
Package manager tar, ... Kernel, docker
* Can mitigate with compression or binary diffs
● Integrity checking
○ This must be done
○ Easy to implement
● Rollback support
○ This should be a requirement: power loss, installation error, etc.
○ Could be hard depending on update type (tarball, package)
● Phased rollout
○ I.e. don’t deploy update to all devices in one go
○ Most do this to some extent: test & production environments
○ Can be more granular on device population (1%, 10%, 25%, 50%, …)
What can
go wrong?
Strategies to reduce the risk of bricking
Prepare for securing the software defined car
● Open source software where no differentiation
● Well-maintained software
● Over-the-air updates
● Apply well-known security design principles
The best way to respond to hacking?
Fiat Chrysler said exploiting the flaw "required
unique and extensive technical knowledge,
prolonged physical access to a subject vehicle and
extended periods of time to write code" and added
manipulating its software "constitutes criminal
action".
Sources: BBC News, Wired
Straubel [Tesla CTO] credits KeenLabs’
researchers [...] says Tesla will pay
KeenLabs’ team a monetary reward for its
work [...] “They did good work,” Straubel says.
“They helped us find something that’s a
problem we needed to fix. And that’s what we
did.”

More Related Content

PDF
Securing the Connected Car - SCaLE 2018
PDF
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
PPT
Chapter 8 Presentaion
PDF
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
PPTX
Identify and mitigate high risk port vulnerabilities
PDF
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
PDF
CNIT 123: Ch 4: Footprinting and Social Engineering
PPTX
OwnYIT CSAT + SIEM
Securing the Connected Car - SCaLE 2018
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Chapter 8 Presentaion
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Identify and mitigate high risk port vulnerabilities
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CNIT 123: Ch 4: Footprinting and Social Engineering
OwnYIT CSAT + SIEM

What's hot (20)

PDF
Secure calling for IP telephony - webinar 2016, English
PPS
Outpost networksecurity
PPTX
Fortinet Network Security Appliance - Case Study, CARE USA
PDF
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
PPSX
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
PPTX
Dncybersecurity
PPTX
I2O Solutions - HDN Network Security Solution
PDF
Introduction to Trusted Computing
PPTX
SQX Solution Day 2013 Q2 - Milestone Update
PPTX
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
PDF
Unified Telecom Hosted Callcenter Suite 1
PPTX
Hello Camera Remote API
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PDF
Presenting iPronto - F Leemans
PDF
How Security can be stronger than a Firewall: 13 different ways breaking thro...
PPT
Firewall intro
PDF
Managed Vulnerability Scan
PPTX
Ng sec 2016
PDF
PDF
ATM Compromise with and without Whitelisting
Secure calling for IP telephony - webinar 2016, English
Outpost networksecurity
Fortinet Network Security Appliance - Case Study, CARE USA
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud
Dncybersecurity
I2O Solutions - HDN Network Security Solution
Introduction to Trusted Computing
SQX Solution Day 2013 Q2 - Milestone Update
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
Unified Telecom Hosted Callcenter Suite 1
Hello Camera Remote API
CNIT 123: Ch 3: Network and Computer Attacks
Presenting iPronto - F Leemans
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Firewall intro
Managed Vulnerability Scan
Ng sec 2016
ATM Compromise with and without Whitelisting
Ad

Similar to Mender.io | Securing the Connected Car (20)

PDF
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
PDF
Software Updates for Connected Devices - OSCON 2018
PPTX
The Path to a Pain-Free Control System Upgrade
PDF
MidoNet roadmap
PDF
MidoNet Vision & Roadmap
PPTX
Migrating to Windows 7 or 8 with Lenovo's Deployment Optimization Solutions
PDF
Standardizing the tee with global platform and RISC-V
PPTX
Security Best Practices for Your Ignition System
PPTX
Acceleration_and_Security_draft_v2
PDF
Mender; the open-source software update solution
PDF
160811_오토테크컨퍼런스_vault micro
PPTX
How to Operate Kubernetes CI/CD Pipelines at Scale
PPTX
Changing Admins Lives Forever with Automated Network Management
PDF
Mender: The open-source software update solution
PDF
Software update for IoT: the current state of play
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
PDF
Countering Cybersecurity Risk in Today's IoT World
PPTX
Hugo Fiennes - Security and the IoT - Electric Imp
PPTX
Sec285 final presentation_joshua_brown
PDF
Materi cyber sec.pdf
Implementing a Security strategy in IoT, Practical example Automotive Grade L...
Software Updates for Connected Devices - OSCON 2018
The Path to a Pain-Free Control System Upgrade
MidoNet roadmap
MidoNet Vision & Roadmap
Migrating to Windows 7 or 8 with Lenovo's Deployment Optimization Solutions
Standardizing the tee with global platform and RISC-V
Security Best Practices for Your Ignition System
Acceleration_and_Security_draft_v2
Mender; the open-source software update solution
160811_오토테크컨퍼런스_vault micro
How to Operate Kubernetes CI/CD Pipelines at Scale
Changing Admins Lives Forever with Automated Network Management
Mender: The open-source software update solution
Software update for IoT: the current state of play
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Countering Cybersecurity Risk in Today's IoT World
Hugo Fiennes - Security and the IoT - Electric Imp
Sec285 final presentation_joshua_brown
Materi cyber sec.pdf
Ad

More from Mender.io (16)

PDF
IoT: Contrasting Yocto/Buildroot to binary OSes
PDF
The ultimate guide to software updates on embedded linux devices
PDF
A million ways to provision embedded linux devices
PDF
Embedded linux build systems
PDF
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
PDF
Configuring wifi in open embedded builds
PDF
IoT Prototyping using BBB and Debian
PDF
Why the yocto project for my io t project elc_edinburgh_2018
PDF
Strategies for developing and deploying your embedded applications and images
PDF
IoT Development from Prototype to Production
PDF
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
PDF
Embedded Linux Build Systems - Texas Linux Fest 2018
PDF
Iot development from prototype to production
PDF
Linux IoT Botnet Wars - ESC Boston 2018
PDF
Linux IoT Botnet Wars and the lack of basic security hardening
PDF
Mender.io | Develop embedded applications faster | Comparing C and Golang
IoT: Contrasting Yocto/Buildroot to binary OSes
The ultimate guide to software updates on embedded linux devices
A million ways to provision embedded linux devices
Embedded linux build systems
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Configuring wifi in open embedded builds
IoT Prototyping using BBB and Debian
Why the yocto project for my io t project elc_edinburgh_2018
Strategies for developing and deploying your embedded applications and images
IoT Development from Prototype to Production
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Embedded Linux Build Systems - Texas Linux Fest 2018
Iot development from prototype to production
Linux IoT Botnet Wars - ESC Boston 2018
Linux IoT Botnet Wars and the lack of basic security hardening
Mender.io | Develop embedded applications faster | Comparing C and Golang

Recently uploaded (20)

PPTX
Tech Workshop Escape Room Tech Workshop
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PPTX
Cybersecurity: Protecting the Digital World
PDF
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
AI Guide for Business Growth - Arna Softech
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Computer Software - Technology and Livelihood Education
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
Python is a high-level, interpreted programming language
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PPTX
CNN LeNet5 Architecture: Neural Networks
PPTX
Download Adobe Photoshop Crack 2025 Free
Tech Workshop Escape Room Tech Workshop
Trending Python Topics for Data Visualization in 2025
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Practical Indispensable Project Management Tips for Delivering Successful Exp...
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
Cybersecurity: Protecting the Digital World
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
AI Guide for Business Growth - Arna Softech
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Computer Software - Technology and Livelihood Education
How to Use SharePoint as an ISO-Compliant Document Management System
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
Python is a high-level, interpreted programming language
Full-Stack Developer Courses That Actually Land You Jobs
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
CNN LeNet5 Architecture: Neural Networks
Download Adobe Photoshop Crack 2025 Free

Mender.io | Securing the Connected Car

  • 2. The software defined car 1990 2000 2010 2020 Hardware enabled Software enabled Software defined Telematics Infotainment Connected Assisted driving AutonomousElectronics
  • 3. About me ● Eystein Stenberg ○ 7 years in systems security management ○ M. Sc., Computer Science, Cryptography ○ eystein@mender.io ● Mender.io ○ Over-the-air updater for Linux, Yocto Project ○ Open source (Apache License, v2) ○ Dual A/B rootfs layout (client) ○ Remote deployment management (server) ○ Under active development
  • 4. Session overview ● Opportunities with the software defined car ● Anatomy of an attack: security risks of the connected car ● The patching problem & solution designs
  • 5. Software defined car: New revenue streams ● “Automakers could add up to $27.1B annually from services such as car sharing and more” - Navigant Research ● Tesla ○ An OTA update system allows for easy additional software purchases after buyers drive their cars off the lot ○ Semi-autonomous Autopilot feature allows current Model S owners to add the feature for $2,500 USD when they order the vehicle or they can pay $3,000 USD to upgrade later
  • 6. Cost savings by using open source platforms IVI stack Hardware Board support pkg. Operating system Middleware Apps HMI Cost 10% 30% 60% Differentiation Focus on open source here ● Lower layers are expensive and provides no differentiation ● Use open source here to ○ Shorten time-to-market ○ Lower cost ○ Reallocate development to differentiating features OTA updater
  • 7. The software defined car requires OTA updates ● Increased software complexity requires more frequent improvements ● “33% of current recalls are for problems that could be fixed OTA” - ABI Research ● “OTA updates will save carmakers $35B in 2022” - IHS Automotive ● Fiat Chrysler hack (next up) required a recall of 1.4 million vehicles that could have been avoided with an OTA update
  • 8. Jeep Cherokee hacked in July 2015 ● Presented at Black Hat USA 2015 ○ Charlie Miller ○ Chris Valasek ● Remote exploit giving full control of the car ● Clearly demonstrates physical safety risk ● No way to fix remotely ● 1.4 million cars recalled ● August 2016: Extended to unauthorized ECU update via CAN
  • 9. Jeep Cherokee Head Unit with Wifi Wifi hotspot offered as a service ● Cherokee customers can buy wifi subscription as an add-on (~$40/month) ● Connect devices in the car to the car’s wifi to get online (phones, tablets, …) ● Wifi is password protected “Head unit”, “IVI”
  • 10. Wifi-based breach: Short-range ● Wifi password based on system time after provisioning ● January 01 2013 00:00 GMT +- 1 minute ● Multimedia system breached due to software vulnerability ● Scope: Control music player/radio/volume and track GPS coordinates when within wifi range Guessable password Software vulnerability
  • 11. Cellular-based breach: Country-wide ● Scope: Control music player/radio/volume and track GPS coordinates countrywide ● Can also select a specific Jeep based on its GPS-coordinates Breach Sprint Cellular network Software vulnerability
  • 12. The Controller Area Network (CAN) bus ● The CAN bus connects ~70 electronic control units (ECUs), including engine control, transmission, airbags, braking ● V850 chip is designed to only read from the CAN bus, to isolate components V850 chip Read-only Diagnostics
  • 13. CAN bus ● The head unit can update the firmware of the V850 ● Firmware update authenticity not checked properly V850 chip Full control Malicious firmware update
  • 14. Putting it together Lessons ● Wifi hotspot password was predictable ● Remotely accessible service (in head unit) was vulnerable (and not updated) ● Firmware update (for V850) did not have proper authenticity checks ● The only way to fix the vulnerabilities is through a manual update (by customer or dealership) FW update Cellular breach Vulnerability
  • 15. More complexity leads to larger attack surface ● 1-25 bugs per 1000 lines of code* ○ Assume that all software components have vulnerabilities ● Rely on well-maintained software and keep it updated ○ Open source vs. proprietary is a red herring ○ Do not build all the software in-house ● Principle of least privilege ● Separation of privilege ● Kerckhoff’s principle *Source: Steve McConnell, Code Complete
  • 16. Security patching is done too late 60 days: >90% probability it is exploited 110 days: remediation time avg. 5-10 days: <10% probability it is exploited Source: How the Rise in Non-Targeted Attacks Has Widened the Remediation Gap, Kenna Security
  • 17. Why security patching happens too late ● The value is invisible until too late ● Too costly or risky ○ Manual? Too expensive to integrate updater? ○ Requires downtime of production? Risk of breaking production? ● Politics ● How often do you patch? ○ Do you have a way to do it? A process? ○ Often not a core competence and not a priority to develop updater
  • 18. Patching connected devices is harder ● No/expensive physical access ○ Need failure management ● Unreliable power ○ What if power disappears in the middle of patching? ● Unreliable (wireless) network connectivity ○ Handle partial downloads ○ Ideally resume downloads in expensive networks like 3G ● Public and insecure (wireless) networks ○ Can someone inject arbitrary code during the update process? ○ Verify authenticity of update
  • 19. Generic embedded updater workflow Detect update (secure channel) Download (secure channel) Integrity (e.g. checksum) Authenticate (e.g. signature) DecryptExtract Install Failure recovery (e.g. roll back) Compatibility check Sanity checks Post-install actions Pre-install actions Must-have Environment-specific Choose a strategy
  • 20. Choice of update type has tradeoffs Full image Package (opkg, …) tar.gz Docker/Containers Download size Large* Small Small Medium Installation time Long* Short Short Short Rollback Yes (dual partition) Hard Hard Yes Consistency Yes Medium Hard Yes Design impact Bootloader, Partition layout Package manager tar, ... Kernel, docker * Can mitigate with compression or binary diffs
  • 21. ● Integrity checking ○ This must be done ○ Easy to implement ● Rollback support ○ This should be a requirement: power loss, installation error, etc. ○ Could be hard depending on update type (tarball, package) ● Phased rollout ○ I.e. don’t deploy update to all devices in one go ○ Most do this to some extent: test & production environments ○ Can be more granular on device population (1%, 10%, 25%, 50%, …) What can go wrong? Strategies to reduce the risk of bricking
  • 22. Prepare for securing the software defined car ● Open source software where no differentiation ● Well-maintained software ● Over-the-air updates ● Apply well-known security design principles
  • 23. The best way to respond to hacking? Fiat Chrysler said exploiting the flaw "required unique and extensive technical knowledge, prolonged physical access to a subject vehicle and extended periods of time to write code" and added manipulating its software "constitutes criminal action". Sources: BBC News, Wired Straubel [Tesla CTO] credits KeenLabs’ researchers [...] says Tesla will pay KeenLabs’ team a monetary reward for its work [...] “They did good work,” Straubel says. “They helped us find something that’s a problem we needed to fix. And that’s what we did.”