the fully networked car geneva, 3-4 march 2010 security risk analysis approach for on-board vehicle...

20
The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

Upload: isabel-thomson

Post on 27-Mar-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Security risk analysis approach for on-board vehicle networks

1

Alastair RuddleConsultant, MIRA Limited

Page 2: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

2Motivation

o Future vehicles will become mobile nodes in a dynamic transport network

• vehicle systems will be under threat from malicious individuals and groups seeking to gain personal or organizational advantage

• ensuring security will be critical for the successful deployment of V2X technology

o EU project EVITA aims to prototype a toolkit of techniques and components to ensure the security of in-vehicle systems

• hardware, software, analysis methods

Page 3: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

EVITA scope and assets 3

ECU

ECU

ECUECU

ECU

Third-PartyOEM Backend

Security

ECU

Security

ECU

Security

ECU

SecuritySecurity

SensorActuator

SensorActuator

SensorActuator

Security

SensorActuator

EVITA only aims to investigate network security solutions at vehicle level

Different levels of security protection are envisaged, depending on need

Some assets may not require security measures (low risk)

Risk analysis aims to prioritize security requirements

Page 4: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

EVITA project security risk analysis rationale

o Too costly to protect against every threat, so need to rank risks in order to prioritize countermeasures

o Risk associated with a security attack depends on:• severity of impact (ie. harm to stakeholders)

—drivers, other road users, civil authorities, ITS operators, vehicle manufacturers and system suppliers

• probability of successful attack—depends on attacker resources, nature of attack

o Physical safety is a key aspect of security• physical harm may be an objective of an attack• harm may also be an unintended consequence

4

Page 5: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Starting point – EVITA Use Cases 5

Powertrain

PTC

Body Electronic

BEM

Diagnosis Interface

Hybrid Drive

Engine Control

Bluetooth

USB

Communication

Unit CU

Transmission

Chassis & Safety

CSC

Chassis /

Steering

Brake Control

Environmental

SensorsPassive Safety

Airbag

Door Modules

Instrument

Light Control

Display / Video

Audio

Navigation

Head Unit

HU

Mobile Device

In-vehicle network structure

PT Sensors

Chassis Sensors

e.g. Steer Angle

GPS/GalileoUMTSDSRC

TelephoneClimate

Seat ECU

A suite of 18 potential use cases was defined, based on EASIS project network architecture

Scenario classes:•car-car•car-infrastructure•mobile devices•aftermarket•maintenance

Assumed reference architecture

Page 6: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Security threat agents and their motivations

o Dishonest drivers • avoid financial obligations, gain traffic advantages;

o Hackers• gain/enhance reputation as a hacker;

o Criminals and terrorists• financial gain, harm or injury to individuals or groups;

o Dishonest organisations• driver profiling, industrial espionage, sabotage of

competitor products;

o Rogue states • achieve economic harm to other societies

6

Page 7: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

7Threat analysis – Attack Trees

Common model to map attack trees to risk analysis

Page 8: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Severity classification in vehicle safety engineering 8

Page 9: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Extending from safety to security 9

Page 10: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Severity classification of privacy infringements 10

Page 11: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Financial severity classification 11

Page 12: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Security severity classification – a 4-component vector 12

Page 13: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Attack potential and probability

o Attack potential evaluation• using established, structured approach from “Common

Criteria”• applied in EVITA at “asset attack” level of attack trees

o Indicative of attack probability (inverse relationship)• numerical scale used to represent relative ranking of attack

probability

13

Page 14: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Possibility for the driver (and/or other traffic participants) to mitigate possible safety hazards

Controllability – safety hazards 14

Page 15: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Risk graph (fragment only) 15

Non-safety aspects addressed with table for controllability C=1 (C>1 only for safety issues)

Page 16: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

A compressed tabular attack tree representation provides a convenient framework for documenting the risk analysis

Attack Objectiv

eSeverity (S)

Attack

Method

Risk level(R)

Combined attack method

probability (A)

Asset (attac

k)

Attack Probabili

ty (P)

B SB

B1 RB1(SB, AB1) AB1=min{Pa,Pb} a &b

Pa

Pb

B2 RB2(SB, AB2) AB2=max{Pd,Pe,Pf}d Pde Pef Pf

Attack tree tables for risk analysis 16

OR: as easy as the easiest optionAND: as hard as the hardest component

Page 17: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Overview of EVITA attack trees

o The 18 EVITA use cases suggested 10 attack trees:• attack E-call, attack E-toll• tamper with warnings, attack active break• manipulate speed limits, force green light• manipulate traffic flow, simulate traffic jam• unauthorized braking, engine denial-of-service

o These are representative, but not exhaustive o Rationalization of the attack trees revealed:

• 44 different asset attacks, involving 16 different assets

o Risk analysis provides the means to assess the relative importance of protecting these assets

17

Page 18: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Risk-based prioritisation of counter-measures 18

Identified threats Risk analysis resultsSecurity requirements

Asset Attack Risk level Instances

Chassis Safety Controller

Denial of service12

31

Authenticity_6, Availability_102, Availability_106

Exploit implementation flaws

45

11

Authenticity_1, Authenticity_2, Authenticity_3 …

Wireless Comms

Corrupt or fake messages

234567

554143

… Confidentiality_1, Confidentiality_2, Authenticity_101…

Jamming45

32

… Availability_107, Availability_108, Integrity_102

Important to protectagainst this asset attack

Low priority

Page 19: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

19Conclusions

o A security risk analysis approach has been developed from automotive safety and IT security practices

• attack trees to identify asset attacks from use cases, attacker type and motivations

• 4-component security risk vector, potentially including security-related safety issues

• attack potential and controllability to assess probability of successful attack

o Level and frequency of risks associated with asset attacks identified in attack trees indicate priorities for counter-measures

Page 20: The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March 2010

Acknowledgements 20

For further information see: www.evita-project.org