64
HoliSec Holistic Approach to Improve Data Security Intrusion Detection for In-vehicle Networks: Reflection on Practical Challenges and the Road Ahead David Thiringer, Nasser Nowdehi, Sebastian Kvarnström March 26, 2019. Time 09:30 – 10:15

HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Intrusion Detection for In-vehicle Networks: Reflection on Practical Challenges and the Road

Ahead David Thiringer, Nasser Nowdehi, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 2: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Recent Automotive Hacks

• 2010 – Vehicles Disabled Remotely Via Web Application (Austin, Texas) – Center for Automotive Embedded Systems Security (CAESS)

• disable the brakes, stop the engine, falsify information on the vehicle’s speedometer, and more

• 2011 – CAESS: radio’s MP3 parser, the vehicle’s Bluetooth system, and the cellular

connection used for the vehicle’s telematics

• 2013 – Miller & Valasek: Tightened seat belt, speedometer attacks, horn blast,

acceleration, headlights, disable power steering, slam on brakes at any speed

• 2015 – Miller & Valasek: Remote hack of Jeep Cherokee

• 2017-2018 – Tencent’s Keen Security Lab: Tesla and BMW i3 hack

2 Topic: Intrusion Detection for In-vehicle Networks

Presenter: Nasser Nowdehi March 26, 2019. Time 09:30 – 10:15

Page 3: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

3 Topic: Intrusion Detection for In-vehicle Networks

Presenter: Nasser Nowdehi March 26, 2019. Time 09:30 – 10:15

CAN bus

Page 4: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

4 Topic: Intrusion Detection for In-vehicle Networks

Presenter: Nasser Nowdehi March 26, 2019. Time 09:30 – 10:15

IDS types

• Signature Based – Recognizing bad patterns, such as malware – Precise detection for known attacks – Unable to detect unknown attacks: Need for constant signature

updates

• Anomaly based – Detecting deviations from a model of "good" traffic, which often

relies on machine learning – Able to detect unknown attacks, doesn’t need signatures – Frequent false positives

Page 5: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

5 Topic: Intrusion Detection for In-vehicle Networks

Presenter: Nasser Nowdehi March 26, 2019. Time 09:30 – 10:15

State-of-the-art approaches

• Specification based

– Message timing

• Low-level properties of ECUs

– Clock behavior

– Voltage behavior

Page 6: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Our Work

• Step 1: – What are the challenges? – Answers:

• Static checks + Anomaly detection • Low memory and processor footprint • Start of deployment from most critical ECUs

• Step 2: – The gaps in the state-of-the-art IVN IDS? Can we

address them? – Answers:

• Stealthy attacks • Specification agnostic

6

Topic: Intrusion Detection for In-vehicle Networks Presenter: Nasser Nowdehi

March 26, 2019. Time 09:30 – 10:15

Page 7: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

A Lightweight Intrusion Detection

System for In-Vehicle

Communication on CAN

David Thiringer

Sebastian Kvarnsträm

7 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 8: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Introduction

• Smarter cars with more functionalities

– Self-driving cars

– Bluetooth, mobile networks

– More possible attack vectors

• Mechanical parts are replaced by electronic signals

– Hackers can cause greater harm than before

8 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 9: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

2015: Remote Access to Jeep

Chris Valasek and Charlie Miller were able to

• Disable the brakes

• Force the car to brake

• Steer the vehicle

• Max the volume of the radio

Remotely, from anywhere in the United States!

9 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 10: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

2018: Who Killed My Parked Car?

Work by K.-T. Cho, Y. Kim & K.G. Shin, where they:

• Drain the car’s battery

• Lock the driver out of the car

All while the ignition was turned off!

10 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 11: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Question

“Is it possible to detect attacks against in-vehicle

networks, within a realistic environment in real

time?”

11 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 12: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

12 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 13: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

In-vehicle Networks

• ECU (Electronic Control Unit)

• CAN (Controller Area Network)

13 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 14: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Security concerns with CAN

• Confidentiality

• Integrity

• Availability

14 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 15: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Question

“Is it possible to detect attacks against in-vehicle

networks, within a realistic environment in real

time?”

• The in-vehicle network investigated is CAN

15 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 16: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

16 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 17: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

17 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 18: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

18 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 19: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

19 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 20: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

20 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 21: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

21 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 22: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

22 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 23: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

23 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 24: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

24 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 25: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Attacks on CAN

Defined in related literature:

• Suspension

• Fabrication

• Masquerade

• Conquest

25 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 26: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Intrusion Detection for CAN

26 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 27: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Question

“Is it possible to detect attacks against in-vehicle

networks, within a realistic environment in real

time?”

• The in-vehicle network investigated is CAN

• Realistic environment corresponds to low resource ECU

27 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 28: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Choice of Algorithm

• Low-end hardware → Algorithm needs to be lightweight

• Low number of false positives → Algorithm needs to be accurate

• Preferably detects the four attack types

One algorithm fits these criteria: CASAD

28 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 29: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

CASAD: CAN-Aware Stealthy Attack

Detection

• Anomaly-based

• Data-driven

• Claims to be lightweight

• Has been shown to have a high detection accuracy

29 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 30: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

What does CASAD do?

Training phase • Given a value L and a time series of payload data

(byte-by-byte works best): • Outputs:

– A value r, its statistical dimension. – A projection matrix: U[L][r], describing the signal

subspace. – A centroid, the mean of all training vectors projected

onto the signal subspace

• Based on this, a threshold for attacks can also be determined.

30 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 31: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

What does CASAD do?

Detection phase • Fill a “lag vector” with the L most recent bytes • Project the lag vector onto the signal subspace • Calculate the Euclidean distance to the centroid

from the projected lag vector If the distance is greater than the threshold, an attack is detected!

31 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 32: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

32 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 33: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

What we have done

• Implemented CASAD on a Raspberry Pi 3 Model B

• CASAD was written in C

• Interface to CAN bus via PiCAN v2

33 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 34: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Question

“Is it possible to detect attacks against in-vehicle

networks, within a realistic environment in real

time?”

• The in-vehicle network investigated is CAN

• Realistic environment corresponds to low resource ECU

• Real time means detecting attacks while they are happening

34 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 35: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Test benches and experiment

set-ups

• Arduino Network

• Box Car Logged Data (Offline)

• Box Car Live Data (Online)

35 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 36: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Design of attacks

• All attack types were implemented on both test benches

• Experiments: 20s normal → 20s attack → 20s normal

• Not realistic attacks on Arduino

• Realistic attacks on the Box Car

36 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 37: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

37 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 38: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Arduino - Suspension attack

38 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 39: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Arduino - Fabrication attack

39

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 40: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Arduino – Masquerade attack

40

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 41: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Arduino – Conquest attack

41 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 42: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

42 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 43: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Preparation to meet real-time

requirements

CAN bus we investigated:

• Busload ~67%

• 24 000 bytes per second

Using parameters: L=10 000 & r=24

• 24 * 10³ * 10 * 10³ * 24 = 5.76*10⁹ multiplications per second

43 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 44: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Optimization of CASAD (1)

Overall improvements

• Threading

• Circular buffer instead of array

Improved accuracy

• Implemented rolling average of departure scores

44 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 45: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Optimization of CASAD (2)

Multiplication reduction

• Lagvector, L=10 000 and L=5 000

• Input downsampling, by 15 and 63

• Output downsampling, by 1 000

45 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 46: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

46

L = 10 000

Boxcar (offline) - Suspension attack

L = 5 000

L = 10 000, output ds 1 000

L = 8 000, input ds 63

L = 8 000, input ds 15

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 47: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

47

L = 10 000

Boxcar (offline) - Fabrication attack

L = 5 000

L = 10 000, output ds 1 000

L = 8 000, input ds 63

L = 8 000, input ds 15

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 48: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

48

L = 10 000

Boxcar (offline) - Masquerade attack

L = 5 000

L = 10 000, output ds 1 000

L = 8 000, input ds 63

L = 8 000, input ds 15

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 49: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

49

L = 10 000

Boxcar (offline) - Conquest attack

L = 5 000

L = 10 000, output ds 1 000

L = 8 000, input ds 63

L = 8 000, input ds 15

Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 50: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Rolling average, Boxcar (Offline)

• Suspension attack

50 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 51: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Rolling average, Boxcar (Offline)

• Fabrication attack

51 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 52: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Rolling average, Boxcar (Offline)

• Masquerade attack

52 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 53: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Rolling average, Boxcar (Offline)

• Conquest attack

53 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 54: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

54 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 55: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Meeting the real-time requirements

• Producer-Consumer problem for reading CAN messages.

• Output downsample of 2 000 required!

55 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 56: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Box Car (Online) - Suspension

attack

56 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 57: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Box Car (Online) - Fabrication attack

57 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 58: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Box Car (Online) - Masqurade attack

58 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 59: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Box Car (Online) - Conquest attack

59 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 60: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

• Background

• Evaluation and Test Benches

• Results: Arduino

• Results: Box Car (Offline)

• Results: Box Car (Online)

• Conclusion

60 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 61: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Conclusion

• We investigated the feasibility of IDS in vehicles

• 4 / 4 attacks were detected on the Arduino

• 3 / 4 attacks were detected on the Box car

• Downsampling makes CASAD more lightweight

• Implementing rolling average reduces false negatives/positives

61 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 62: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Future work

• GPUs - Optimized for matrix operations

• Source Detection - Detect which ECU is attacking!

• Intrusion Prevention System - Stop the attacker

62 Topic: Intrusion Detection for In-vehicle Networks Presenter: David Thiringer, Sebastian Kvarnström

March 26, 2019. Time 09:30 – 10:15

Page 63: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

References

[1] Valasek, C., & Miller, C. (2015). Remote Exploitation of an Unaltered Passenger Vehicle. Technical White Paper, 2015, 1–91. https://doi.org/10.1088/2041-8205/762/2/L23

[2] Cho, K.-T., Kim, Y., & Shin, K. G. (2018). Who Killed My Parked Car?, 1–27. Retrieved from http://arxiv.org/abs/1801.07741

[3] Cho, K.-T, & Shin, K. G. (2016). Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. Usec, 911–927.

[4] N. Nowdehi, W. Aoudi, M. Almgren and T. Olovsson, “CASAD: CAN-aware stealthy-attack detection for in-vehicle networks”, Not yet published, N.D.

63 Topic: Intrusion Detection for In-vehicle Networks Presenter:

Nasser Nowdehi, David Thiringer, Sebastian Kvarnström March 26, 2019. Time 09:30 – 10:15

Page 64: HoliSec Holistic Approach to Improve Data Security · Holistic Approach to Improve Data Security Recent Automotive Hacks • 2010 –Vehicles Disabled Remotely Via Web Application

HoliSec Holistic Approach to Improve Data Security

Thank you for your attention!

64