• No results found

In-ComVec Sec: in-vehicle security for medium and heavy duty vehicles

N/A
N/A
Protected

Academic year: 2021

Share "In-ComVec Sec: in-vehicle security for medium and heavy duty vehicles"

Copied!
1
0
0

Loading.... (view fulltext now)

Full text

(1)

Introduction

Transport goods worth about $53 billion

were moved each day in 2015

• Financially motivated attacks.

Emergency vehicle response time is critical

• Personally motivated attacks.

Capital equipment bear high asset value

• Commercially motivated attacks.

Military vehicles are mission critical

• Politically motivated attacks.

In-ComVec Sec: In-vehicle Security for Medium and Heavy Duty Vehicles

Subhojeet Mukherjee

Advisor: Dr. Indrakshi Ray, Dr. Indrajit Ray

Computer Science Department

Colorado State University

This work was supported in part by NSF under award numbers CNS 1619641 and CNS 1715458.

Why In-ComVec Sec

Electronic control units (ECU) communicate over the 2-wire CAN bus

• Make informed decisions.

• Enhanced reliability, quality and safety. • Messages composed and interpreted

according to SAE J1939 standards.

Existing flaws in ECU and external connectivity can be exploited

• Direct access to critical ECUs via CAN bus can be threatening.

Mechatronic Threats: Our Scope

Passenger car security was perceived towards the middle of last decade

• 1.4 million Jeep cars recalled in 2015.

• Significant amount of security research on CAN since 2004.

Heavy vehicles are different…

• Attacking SAE J1939, a common standard, can have large-scale impact. • Non-proprietary standards on actively changing networks.

• Greater automation and external access.

New, possibly unknown threats are likely.

Highly adaptive, and possibly novel security solutions are required.

A Novel Research Topic

ECM BCM

TCM Bridge Trailer

Insider: Garage personnel, engineer, driver

External: Fleet operator, opponent, competitor, thief, hijacker

In-ComVec Sec

Prepare

A testbed for conducting sandboxed heavy vehicle security research

• Nodes connected to the network • Engine and retarder controller. • Brake controller

• Telematics unit

• Beaglebone node controllers. • Remote access.

• Allows access to a CAN backbone. Response Cannot Respond Periodic Messages Request Issue

• Network nodes will process all requests directed to them [SAE J1939-21].

Attack

• Bombard a node with multiple requests.

Impact

• Node stops functioning.

• Replies back with cannot respond.

• Periodic messages decrease drastically.

Succesfully executed on a real truck at the 1st

Cyber-Truck challenge, Warren, Michigan.

Invade

Request Overload

Experiment independent Factors

• number of concurrent thread • injection time interval in ms • source address

High Priority messages

• Average drop: 46%

Low Priority Messages

• Average drop: 65 %

Two-tailed Mann-Whitney U test

• p-value of 0.01468 (<= .5) • 5% confidence interval 4,.4,F9 8,1.2,F9

Connection Exhaustion

Data Allocate Reallocate 5 CRASH !! 21 Issue

• During connection set-up a RTS can be sent to the recipient with piggybacked message size [SAE J1939-21].

• If a new RTS is sent, it shall be acted upon. • No notification is sent back to the original

sender.

Attack

• Send false RTS with reduced message size.

Impact

• Possible buffer overflow.

False RTS

00 0B 11

Connect

Keep Alive

Issue

• Only 255 possible addresses.

• Only 1 active connection from a node [SAE J1939-21].

• Connections can be kept alive by

sending periodic clear-to-send (CTS).

Attack

• Masquerade as nodes on the network. • Make connections.

Impact

• Legitimate connections are rejected.

Refused

Defend

Anomaly-Based Message Injection Detection

Report Precedence Graphs (RPG).

• Reports are basic units of state information derived from one J1939 message.

Erratic, unplanned transitions characterize malicious behavior.

• Hard-barking, tire-slip are anomalous but not malicious.

• Can distinguish such behavior from attacks.

Features

• Normalized Graph Flux Capacity (NGFC)

• Flux capacity: fc(n) = in-deg(n)*out-deg(n) • NGFC = ∑fc(n)/|{n}|3

• Edge-Weight Distribution Skewness (EWS)

Visualizing anomalous behavior • Blue box

• Hard-brake

• No significant deviation in both features

• Red box

• Attack

• Significant deviation in both features

Has short trend

Calculate forecast band with/without trend

Compare NEW NGFC and EWS value with band Out Of Band …… Moving window of 30 predictor values YES NGFC and EWS Buffer

No Simple/Holt’s Exponential Smoothing Augmented Dickey-Fuller unit-root test Results

• Almost 80-90% of injections detected. 60-70% attack windows detected. • 1-9 % false positive (hard-brake) detection rate.

Vehicle (Attack) State Visualization

Submit exploits Submit feedback Use exploits Research/Refine Reuse Exploits

Obtain Attack Traffic Patterns

Visualize vehicle states

• Vehicle states are distinct combinations of parameter instances. • Our application realizes states from network traffic.

• Eg. accelerating, hard-braking, malicious message injections etc.

Prevent malicious injections.

• Adapting low power cryptographic approaches.

Ongoing and Future Research

@SAE Comvec’16

References

Related documents

Hade Ingleharts index använts istället för den operationalisering som valdes i detta fall som tar hänsyn till båda dimensionerna (ökade självförverkligande värden och minskade

Ongoing SSE Alumni Club matters shall be attended to for the period up to and including the next Annual Meeting by a Board of Directors consisting of a minimum of five, and a

People who make their own clothes make a statement – “I go my own way.“ This can be grounded in political views, a lack of economical funds or simply for loving the craft.Because

[r]

Since an inflation targeting framework was first adopted by New Zealand in 1989, a growing number of countries have their monetary policy anchoring to an

The difference in electrical output characteristics between the two different kinds of samples might be explained according to the mechanism discussed above, taking into account

Figure 44: The figure shows a plot of the simulated velocity, acceleration and jerk signals from the vehicle when using a switched controller with a P controller, with a fast

In this thesis we investigated the Internet and social media usage for the truck drivers and owners in Bulgaria, Romania, Turkey and Ukraine, with a special focus on