Automotive network security ECU attacks

Publisher:电子创新者Latest update time:2024-01-18 Source: 谈思实验室 Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

01



Overview


From the perspective of automotive electronics and electrical architecture, a car is a structure composed of ECUs (points) and buses (lines) (wireless sensing is rarely used inside the car, and gateways, T-BOX, etc. are also collectively referred to as ECUs. ). Attacking cars actually involves attacking different ECUs. What are the attack vectors of ECUs and how to attack an ECU are the most interesting topics for hackers, and they are also the first thing to figure out for vehicle defense.


02


ECU structure


First, let’s take a look at what the ECU looks like from several different angles.


1.Physics


Taking apart an ECU, the most intuitive point of view is that an ECU can be divided into two parts:


Chip/PCB + interface;



  • The chip/PCB is the part encapsulated in a metal shell (electromagnetic interference)


  • Interfaces can be divided into two types: unhidden communication interface + hidden debugging interface



2. Operating system


Looking at the ECU from the perspective of the operating system is to understand how the firmware runs and to crack the ECU's firmware;

3.Program structure


This is a unique part of the car's controller. From this classification perspective, specific attack methods targeting different ECU modules can be further clarified.

Let’s first look at the ECU from these three perspectives. These three perspectives involve hardware, operating system/program running method, and automotive electronic software. Each part is very detailed. I hope I can explain it in detail in the future.


03


ECU attack


The previous section talked about what an automotive ECU is, and from what angles it is classified hierarchically, so as to obtain the attack vector in this section. The above three angles can be unified into the following three layers:


Network (interface): Protocol attacks (from the first and third perspectives)


Firmware (FLASH): Reverse of firmware (from the first, second, and third perspectives)


Chip/PCB: Physical Attack (from a first perspective)


04


network


Network attack vectors can pass through wireless networks and wired networks; wired networks are mainly CAN networks; CAN network attacks can be divided into attacks on RAW frames and attacks on protocol messages; attacks on RAW frames are mainly caused by the attributes of CAN itself of:

  1. No authentication


  2. priority


  3. broadcast


  4. bus error


For protocol messages, you can look at it from a third perspective:


diagnostic message


application message


Network management messages


05


firmware


Firmware acquisition: There are many ways to obtain firmware, and there are many introductions; from a first point of view, firmware acquisition can be directly extracted from FLASH, read from the debugging port, and even dynamically debugged.


Firmware analysis: Let’s look at this from the second perspective first. General-purpose operating systems have their own tool chains, which are relatively troublesome. If there is no distinction between operating systems and programs, you can directly use dynamic and static analysis tools.


Exploiting vulnerabilities: For general-purpose operating systems, there are many ways to exploit them; for another, you can steal some data and change some parameters, but persistent exploitation is a problem.


06


chip


At the chip level, there are some physical attack methods, the most typical ones are side channel analysis and fault injection. Refer to a picture from NXP.




07


Protect


Let’s talk briefly about protection. There should be corresponding protection measures against various attacks. The foundation of protection is still based on cryptography. At present, it is necessary to ensure hardware security and establish a trustworthy system. The main ones used are hardware security modules, such as HSM and TPM.


HIS SHE


This specification mainly talks about the hardware security module based on symmetric encryption (AES), how to manage its keys, how to use them, and introduces processes such as secure boot.

EVITA SHE


This project introduces the use of different security level designs for different scenarios, divided into three types: FULL Medium Light, and also divides the message security levels.




Reference address:Automotive network security ECU attacks

Previous article:Apple wins Project Titan patent for new airbag system for autonomous vehicle cabs and more
Next article:Redefining smart cars: BYD releases vehicle intelligence strategy

Latest Automotive Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号