Top Banner
In vehicle CAN network security An overview
31

DefCamp 2013 - In vehicle CAN network security

Sep 12, 2014

Download

Technology

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DefCamp 2013 - In vehicle CAN network security

In vehicle CAN network security

An overview

Page 2: DefCamp 2013 - In vehicle CAN network security

Bogdan-Ioan Şuta

• System manager at AtoS IT Solutions and Services

• Former Embedded C developer at Hella Romania

• Graduated Master in Automotive Embedded Software from "Politehnica" University of Timisoara

• Interested in computers, cars and anything in between

Page 3: DefCamp 2013 - In vehicle CAN network security

IN VEHICLE NETWORKSOverview

Page 4: DefCamp 2013 - In vehicle CAN network security

In vehicle networks

• Used for information sharing between ECUs (Electronic Control Unit)

• Reduce the number of wires needed inside a vehicle between ECUs

• Come in many forms:– By medium: two-wire, one-wire, optical, wireless– By protocol: Ethernet, CAN, LIN, FlexRay, MOST, K

Line etc.

Page 5: DefCamp 2013 - In vehicle CAN network security

In vehicle networks

Page 6: DefCamp 2013 - In vehicle CAN network security

CONTROLLER AREA NETWORKOverview

Page 7: DefCamp 2013 - In vehicle CAN network security

Controller Area Network

• Developed by Robert Bosch GmbH in 1983• Designed for electrically noisy environments• Baud rates of up to 1Mb/s• Broadcast type network• Frames composed of (minimalistic):– ID field – used for arbitration – either 11 or 24 bits

long– Data Field – actual transported data - up to 8 bytes – CRC Field – for error correction – 15 bits

Page 8: DefCamp 2013 - In vehicle CAN network security

HACKING VEHICLE NETWORKS

Page 9: DefCamp 2013 - In vehicle CAN network security

Hacking vehicle networks• MIT did it:– Comprehensive Experimental Analyses

of Automotive Attack Surfaces - http://youtu.be/bHfOziIwXic

• Blogs made tutorials for it:– Hack a day -

http://hackaday.com/2013/10/21/can-hacking-introductions/

• Individuals also tried their luck:– http://

secuduino.blogspot.ro/2011/04/grupo-volkswagen-can-confort.html

Page 10: DefCamp 2013 - In vehicle CAN network security

Hacking vehicle networks

• Various hardware is available to do it:– The OpenXC Platform -

http://openxcplatform.com/– Arduino shields are available -

http://www.skpang.co.uk/catalog/arduino-canbus-shield-with-usd-card-holder-p-706.html

– Custom – any microcontroller with a CAN controller with an CAN transceiver will work

Page 11: DefCamp 2013 - In vehicle CAN network security

MY ATTEMPTSAt hacking the CAN bus

Page 12: DefCamp 2013 - In vehicle CAN network security

Proposition

• Connect to the CAN bus• Identify messages being transmitted on the

bus• Perform spoofing and flood attacks• Do not get into diagnostic based attacks

(change odometer, disable immobilizer)

Page 13: DefCamp 2013 - In vehicle CAN network security

Setup• VW Passat 2001• Breadboard• mBed LPC 1768 development board• 2x Microchip MCP 2551 CAN tranceivers• PC with TerraTerm used for communicating with

the mBed• mBed programmed for CAN monitoring,

flooding and spoofing• First connection attempt:

– Male OBD-II connector connected to the diagnostic port of the CAR

• Second attempt:– Twisted pair of conductors from a CAT-5 cable

connected at the back of the VW Climatronic

Page 14: DefCamp 2013 - In vehicle CAN network security
Page 15: DefCamp 2013 - In vehicle CAN network security

FIRST ATTEMPTUsing OBD connector

Page 16: DefCamp 2013 - In vehicle CAN network security

OBD Cable

Page 17: DefCamp 2013 - In vehicle CAN network security

First attempt: FAILED

• Communication was not possible• Subject car does not have CAN on the OBD-II

Connector• Only K line was present

Page 18: DefCamp 2013 - In vehicle CAN network security

SECOND ATTEMPTDirect connection

Page 19: DefCamp 2013 - In vehicle CAN network security

Connection to car

Page 20: DefCamp 2013 - In vehicle CAN network security

Second attempt: SUCCESS

• A few tries and some info from: http://secuduino.blogspot.ro/2011/04/grupo-volkswagen-can-confort.html

• Connected to Convenience CAN• Baud rate of 100kb/s• Communication established

Page 21: DefCamp 2013 - In vehicle CAN network security

A bit of sniffing…

• Found CAN messages from– Door locks– Electric windows• Position of window• Status of button (pressed, not pressed)

– Instruments backlighting value– Lots of other data that I couldn’t find a correlation

Page 22: DefCamp 2013 - In vehicle CAN network security

Some spoofing…

• Sending commands that would originate from the Body Control Module

Page 23: DefCamp 2013 - In vehicle CAN network security

VIDEO Power windows

Page 24: DefCamp 2013 - In vehicle CAN network security

And some flooding

• Sending a very high priority CAN message on the network continuously

• Using hardware interrupts so no delays occur

Page 25: DefCamp 2013 - In vehicle CAN network security

VIDEOCar door locks

Page 26: DefCamp 2013 - In vehicle CAN network security

Security issues

• No authentication of nodes• Messages are not scrambled• Security by obscurity

Page 27: DefCamp 2013 - In vehicle CAN network security

Counter measures• Researched and developed by many universities and

companies:– Efficient Protocols For Secure Broadcast In Controller Area

Networks - http://www.aut.upt.ro/~bgroza/Papers/CAN-Sec.pdf

– LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks - http://www.aut.upt.ro/~bgroza/Papers/LIBRA.pdf

– Broadcast Authentication in a Low Speed Controller Area Network - http://www.aut.upt.ro/~bgroza/Papers/CANAut.pdf

– Low cost multicast network authentication for embedded control systems - http://128.2.129.29/research/publications/2012/CMU-ECE-2012-011.pdf

– Many more

Page 28: DefCamp 2013 - In vehicle CAN network security

CONCLUSIONS

Page 29: DefCamp 2013 - In vehicle CAN network security

Conclusions

• Hacking vehicle networks is EASY• Through trial and error much information can

be obtained -> security by obscurity is not sufficient

• With great power comes great responsibility– Getting information from the vehicle bus can

enhance use of the vehicle– People with bad intentions can cause damages

and injuries

Page 30: DefCamp 2013 - In vehicle CAN network security

Contributors

• Ioan Dubar• Alexandru Leipnik• Bogdan Groza• Alexandru George Andrei• My parents

Page 31: DefCamp 2013 - In vehicle CAN network security

Thank you.