01
Overview
From the perspective of automotive electronics and electrical architecture, a car is a structure composed of ECUs (points) and buses (lines) (wireless sensing is rarely used inside the car, and gateways, T-BOX, etc. are also collectively referred to as ECUs. ). Attacking cars actually involves attacking different ECUs. What are the attack vectors of ECUs and how to attack an ECU are the most interesting topics for hackers, and they are also the first thing to figure out for vehicle defense.
02
ECU structure
First, let’s take a look at what the ECU looks like from several different angles.
1.Physics
Taking apart an ECU, the most intuitive point of view is that an ECU can be divided into two parts:
Chip/PCB + interface;
The chip/PCB is the part encapsulated in a metal shell (electromagnetic interference)
Interfaces can be divided into two types: unhidden communication interface + hidden debugging interface
2. Operating system
Looking at the ECU from the perspective of the operating system is to understand how the firmware runs and to crack the ECU's firmware;
3.Program structure
This is a unique part of the car's controller. From this classification perspective, specific attack methods targeting different ECU modules can be further clarified.
Let’s first look at the ECU from these three perspectives. These three perspectives involve hardware, operating system/program running method, and automotive electronic software. Each part is very detailed. I hope I can explain it in detail in the future.
03
ECU attack
The previous section talked about what an automotive ECU is, and from what angles it is classified hierarchically, so as to obtain the attack vector in this section. The above three angles can be unified into the following three layers:
Network (interface): Protocol attacks (from the first and third perspectives)
Firmware (FLASH): Reverse of firmware (from the first, second, and third perspectives)
Chip/PCB: Physical Attack (from a first perspective)
04
network
Network attack vectors can pass through wireless networks and wired networks; wired networks are mainly CAN networks; CAN network attacks can be divided into attacks on RAW frames and attacks on protocol messages; attacks on RAW frames are mainly caused by the attributes of CAN itself of:
No authentication
priority
broadcast
bus error
For protocol messages, you can look at it from a third perspective:
diagnostic message
application message
Network management messages
05
firmware
Firmware acquisition: There are many ways to obtain firmware, and there are many introductions; from a first point of view, firmware acquisition can be directly extracted from FLASH, read from the debugging port, and even dynamically debugged.
Firmware analysis: Let’s look at this from the second perspective first. General-purpose operating systems have their own tool chains, which are relatively troublesome. If there is no distinction between operating systems and programs, you can directly use dynamic and static analysis tools.
Exploiting vulnerabilities: For general-purpose operating systems, there are many ways to exploit them; for another, you can steal some data and change some parameters, but persistent exploitation is a problem.
06
chip
At the chip level, there are some physical attack methods, the most typical ones are side channel analysis and fault injection. Refer to a picture from NXP.
07 Protect Let’s talk briefly about protection. There should be corresponding protection measures against various attacks. The foundation of protection is still based on cryptography. At present, it is necessary to ensure hardware security and establish a trustworthy system. The main ones used are hardware security modules, such as HSM and TPM. HIS SHE This specification mainly talks about the hardware security module based on symmetric encryption (AES), how to manage its keys, how to use them, and introduces processes such as secure boot. EVITA SHE This project introduces the use of different security level designs for different scenarios, divided into three types: FULL Medium Light, and also divides the message security levels.
Previous article:Apple wins Project Titan patent for new airbag system for autonomous vehicle cabs and more
Next article:Redefining smart cars: BYD releases vehicle intelligence strategy
- Popular Resources
- Popular amplifiers
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Could you please help me with how to calculate the VGS of this current mirror? Thank you very much!
- GigaDevice's new GD32F470xx series with TFT and Ethernet port
- MicroPython adds support for operator @
- I would like to ask you about the ODB protocol dedicated chip
- 【GD32L233C-START Review】1. Unboxing
- Generators: Pulse, Pattern and Arbitrary Waveform (AWG)
- Frequency calculation
- The chip shortage will end in 2023 and there may be overcapacity in 2024. Do you believe it?
- Can the shared power bank industry really make money?
- BlueNRG-series level 1 training materials