[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3488932.3523263acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs

Published: 30 May 2022 Publication History

Abstract

Controller Area Network (CAN) is the de-facto standard in-vehicle network system. Despite its wide adoption by automobile manufacturers, the lack of security design makes it vulnerable to attacks. For instance, broadcasting packets without authentication allows the impersonation of electronic control units (ECUs). Prior mitigations, such as message authentication or intrusion detection systems, fail to address the compatibility requirement with legacy ECUs, stealthy and sporadic malicious messaging, or guaranteed attack detection. We propose a novel authentication system called ShadowAuth that overcomes the aforementioned challenges by offering backwardcompatible packet authentication to ECUs without requiring ECU firmware source code. Specifically, our authentication scheme provides transparent CAN packet authentication without modifying existing CAN packet definitions (e.g., J1939) via automatic ECU firmware instrumentation technique to locate CAN packet transmission code, and instrument authentication code based on the CAN packet behavioral transmission patterns. ShadowAuth enables vehicles to detect state-of-the-art CAN attacks, such as busoff and packet injection, responsively within 60ms without false positives. ShadowAuth provides a sound and deployable solution for real-world ECUs.

Supplementary Material

MP4 File (ASIA-CCS22-fp425.mp4)
This video presents ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. Controller Area Network (CAN) is the de-facto standard in-vehicle network. Despite its wide adoption by automobile manufacturers, the lack of security design makes it vulnerable to attacks. Prior mitigations, such as message authentication or intrusion detection systems, fail to address the compatibility requirement with legacy ECUs, stealthy and sporadic malicious messaging, or guaranteed attack detection. We propose a novel authentication system called ShadowAuth that overcomes the aforementioned challenges. Specifically, our scheme provides CAN packet authentication without modifying existing CAN packet definitions (e.g., J1939) via automatic ECU firmware instrumentation technique. ShadowAuth enables vehicles to detect attacks, such as bus-off and packet injection, responsively within 60ms without false positives. ShadowAuth provides a sound and deployable solution for real-world ECUs.

References

[1]
1BitSquared. 2021. Black Magic Probe V2.1. https://1bitsquared.com/products/black-magic-probe
[2]
angr. 2021. pypcode. https://github.com/angr/pypcode
[3]
Erick Bauman, Zhiqiang Lin, Kevin W Hamlen, et almbox. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In NDSS.
[4]
Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. 2019. TOUCAN: A ProTocol tO SecUre Controller Area Network. In Proceedings of the ACM Workshop on Automotive Cybersecurity (Richardson, Texas, USA) (AutoSec '19). Association for Computing Machinery, New York, NY, USA, 3--8. https://doi.org/10.1145/3309171.3309175
[5]
Bryan Buck and Jeffrey K. Hollingsworth. 2000. An API for Runtime Code Patching. Int. J. High Perform. Comput. Appl., Vol. 14, 4 (Nov. 2000), 317--329. https://doi.org/10.1177/109434200001400404
[6]
Jianer Chen, Iyad A. Kanj, and Ge Xia. 2010. Improved upper bounds for vertex cover. Theoretical Computer Science, Vol. 411, 40 (2010), 3736--3756. https://doi.org/10.1016/j.tcs.2010.06.026
[7]
Kyong-Tak Cho and Kang G. Shin. 2016a. Error Handling of In-Vehicle Networks Makes Them Vulnerable. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS '16). Association for Computing Machinery, New York, NY, USA, 1044--1055. https://doi.org/10.1145/2976749.2978302
[8]
Kyong-Tak Cho and Kang G. Shin. 2016b. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In Proceedings of the 25th USENIX Conference on Security Symposium (Austin, TX, USA) (SEC'16). USENIX Association, USA, 911--927.
[9]
Kyong-Tak Cho and Kang G. Shin. 2017. Viden: Attacker Identification on In-Vehicle Networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 1109--1123. https://doi.org/10.1145/3133956.3134001
[10]
Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and Dong Hoon Lee. 2018. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks. IEEE Transactions on Vehicular Technology, Vol. 67, 6 (2018), 4757--4770. https://doi.org/10.1109/TVT.2018.2810232
[11]
Jeremy Daily. 2021. Heavy Vehicle CAN Data. https://www.engr.colostate.edu/ jdaily/J1939/candata.html
[12]
Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 2020 IEEE Symposium on Security and Privacy (SP). 1497--1511. https://doi.org/10.1109/SP40000.2020.00009
[13]
Rabbit ECU. 2021. Rabbit ECU Project. https://mdac.com.au/rabbit-ecu-project/
[14]
Samir Fassak, Younes El Hajjaji El Idrissi, Noureddine Zahid, and Mohamed Jedra. 2017. A secure protocol for session keys establishment between ECUs in the CAN bus. In 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). 1--6. https://doi.org/10.1109/WINCOM.2017.8238149
[15]
R Fletcher, A Mahindroo, N Santhanam, and A Tschiesner. 2020. The case for an end-to-end automotive-software platform. McKinsey & Company (2020).
[16]
I. Matteucci G. Costantino. 2020. KOFFEE - Kia OFFensivE Exploit Attack Surface in Automotive IoT. https://sowhat.iit.cnr.it/pdf/IIT-20-2020.pdf
[17]
Robert Bosch GmbH. 2021. Engine Control Unit. https://www.bosch-mobility-solutions.com/en/solutions/control-units/eengine-control-unit/
[18]
Bogdan Groza, Stefan Murvay, Anthony van Herrewege, and Ingrid Verbauwhede. 2012. LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. In Cryptology and Network Security, Josef Pieprzyk, Ahmad-Reza Sadeghi, and Mark Manulis (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 185--200.
[19]
Dongsoo Ha, Wenhui Jin, and Heekuck Oh. 2018. REPICA: Rewriting Position Independent Code of ARM. IEEE Access, Vol. 6 (2018), 50488--50509. https://doi.org/10.1109/ACCESS.2018.2868411
[20]
Subir Halder, Amrita Ghosal, and Mauro Conti. 2020. Secure over-the-air software updates in connected vehicles: A survey. Computer Networks, Vol. 178 (2020), 107343. https://doi.org/10.1016/j.comnet.2020.107343
[21]
A. Hazem and H. Fahmy. 2012. LCAP-A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks.
[22]
A. V. Herrewege, Dave Singelée, and I. Verbauwhede. 2011. CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus.
[23]
Irina Hossain and Syed Masud Mahmud. 2007. Analysis of a Secure Software Upload Technique in Advanced Vehicles using Wireless Links. In 2007 IEEE Intelligent Transportation Systems Conference. 1010--1015. https://doi.org/10.1109/ITSC.2007.4357797
[24]
Galen Hunt and Doug Brubacher. 1999. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd Conference on USENIX Windows NT Symposium - Volume 3 (Seattle, Washington) (WINSYM'99). USENIX Association, USA, 14.
[25]
Infineon. 2013. SAK-TC1767--256F80HR AD. https://www.infineon.com/cms/en/product/microcontroller/legacy-microcontroller/other-legacy-mcus/audo-family/tc1767-audo-future/sak-tc1767-256f80hr-ad/
[26]
SAE International. 2021 a. SAE J1939 Standards Collection. https://www.sae.org/publications/collections/content/j1939_dl/
[27]
SAE International. 2021 b. SAE J1939 Standards Collection. https://www.sae.org/standardsdev/groundvehicle/j1939a.htm
[28]
SAE International. 2022. VW Transport Protocol 2.0 (TP 2.0) for CAN bus. https://jazdw.net/tp20
[29]
ISO 11898:2015 2015. Road vehicles - Controller area network (CAN). Standard. International Organization for Standardization, Geneva, CH.
[30]
Hyo Jin Jo, Jin Hyun Kim, Hyon-Young Choi, Wonsuk Choi, Dong Hoon Lee, and Insup Lee. 2020. MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. IEEE Transactions on Vehicular Technology, Vol. 69, 2 (2020), 2204--2218. https://doi.org/10.1109/TVT.2019.2961765
[31]
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. 2017. RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. In Proceedings of the 33rd Annual Computer Security Applications Conference (Orlando, FL, USA) (ACSAC 2017). Association for Computing Machinery, New York, NY, USA, 412--424. https://doi.org/10.1145/3134600.3134627
[32]
Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, and Dave (Jing) Tian. 2021. PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 249--266. https://www.usenix.org/conference/usenixsecurity21/presentation/kim
[33]
Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society. https://www.ndss-symposium.org/ndss-paper/easi-edge-based-sender-identification-on-resource-constrained-platforms-for-automotive-networks/
[34]
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. 2010. Experimental Security Analysis of a Modern Automobile. In 2010 IEEE Symposium on Security and Privacy. 447--462. https://doi.org/10.1109/SP.2010.34
[35]
Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, and Vyas Sekar. 2019. CANvas: Fast and Inexpensive Automotive Network Mapping. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 389--405. https://www.usenix.org/conference/usenixsecurity19/presentation/kulandaivel
[36]
Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. 2014. CaCAN - Centralized Authentication System in CAN.
[37]
S.M. Mahmud, S. Shanker, and I. Hossain. 2005. Secure software upload in an intelligent vehicle via wireless communication links. In IEEE Proceedings. Intelligent Vehicles Symposium, 2005. 588--593. https://doi.org/10.1109/IVS.2005.1505167
[38]
Karim Mansour, Wael Farag, and Mohamed ElHelw. 2012. AiroDiag: A sophisticated tool that diagnoses and updates vehicles software over air. In 2012 IEEE International Electric Vehicle Conference. 1--7. https://doi.org/10.1109/IEVC.2012.6183181
[39]
Pal-Stefan Murvay and Bogdan Groza. 2014. Source Identification Using Signal Characteristics in Controller Area Networks. IEEE Signal Processing Letters, Vol. 21, 4 (2014), 395--399. https://doi.org/10.1109/LSP.2014.2304139
[40]
D. K. Nilsson and U. E. Larson. 2008. Secure Firmware Updates over the Air in Intelligent Vehicles. In ICC Workshops- 2008 IEEE International Conference on Communications Workshops. 380--384. https://doi.org/10.1109/ICCW.2008.78
[41]
Dennis K. Nilsson, Ulf E. Larson, and Erland Jonsson. 2008a. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes. In 2008 IEEE 68th Vehicular Technology Conference. 1--5. https://doi.org/10.1109/VETECF.2008.259
[42]
Dennis K. Nilsson, Lei Sun, and Tatsuo Nakajima. 2008b. A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs. In 2008 IEEE Globecom Workshops. 1--5. https://doi.org/10.1109/GLOCOMW.2008.ECP.56
[43]
Stefan Nürnberger and Christian Rossow. 2016. -- vatiCAN -- Vetted, Authenticated CAN Bus. In Cryptographic Hardware and Embedded Systems -- CHES 2016, Benedikt Gierlichs and Axel Y. Poschmann (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 106--124.
[44]
Kapil Anand, Aparna Kotha, Matthew Smithson, Rajeev Barua, and Angelos D. Keromytis. 2011. Retrofitting Security in COTS Software with Binary Rewriting. In Future Challenges in Security and Privacy for Academia and Industry, Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, and Carlos Rieder (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 154--172.
[45]
Jack O'Connor, Jean-Philippe Aumasson, Samuel Neves, and Zooko Wilcox-O'Hearn. 2021. Blake3, one function, fast everywhere. https://raw.githubusercontent.com/BLAKE3-team/BLAKE3-specs/master/blake3.pdf
[46]
Mert D. Pesé, Jay W. Schauer, Junhui Li, and Kang G. Shin. 2021. S2-CAN: Sufficiently Secure Controller Area Network. Association for Computing Machinery, New York, NY, USA, 425--438. https://doi.org/10.1145/3485832.3485883
[47]
Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A Lightweight Authentication Protocol for CAN. In Computer Security -- ESORICS 2016, Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows (Eds.). Springer International Publishing, Cham, 283--300.
[48]
Ted Romer, Geoff Voelker, Dennis Lee, Alec Wolman, Wayne Wong, Hank Levy, Brian Bershad, and Brad Chen. 1997. Instrumentation and Optimization of Win32/Intel Executables Using Etch. In Proceedings of the USENIX Windows NT Workshop on The USENIX Windows NT Workshop 1997 (Seattle, Washington) (NT'97). USENIX Association, USA, 1.
[49]
rusEFI. 2021. A GPL open source Engine Management System. https://rusefi.com/
[50]
Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, and Dongyan Xu. 2021. Exposing New Vulnerabilities of Error Handling Mechanism in CAN. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association. https://www.usenix.org/conference/usenixsecurity21/presentation/serag
[51]
Shellphish. 2017. Patcherex, Shellphish's automated patching engine, originally created for the Cyber Grand Challenge. https://github.com/angr/patcherex/
[52]
STMicroelectronics. 2021. ST-LINK/V2 in-circuit debugger/programmer for STM8 and STM32. https://www.st.com/en/development-tools/st-link-v2.html
[53]
Telecommunication Standardization Sector Of International Telecommunication Union. 2020. Guidelines for an intrusion detection system for in-vehicle networks. https://www.sae.org/publications/collections/content/j1939_dl/
[54]
United States Congress. 2020. Clean Air Act Section 203(a)(3)(B); 42 U.S. Code § 7522.
[55]
United States Environmental Protection Agency. 2020. EPA Tampering Policy: The EPA Enforcement Policy on Vehicle and Engine Tampering and Aftermarket Defeat Devices under the Clean Air Act. https://www.epa.gov/sites/default/files/2020-12/documents/epatamperingpolicy-enforcementpolicyonvehicleandenginetampering.pdf
[56]
Jo Van Bulck, Jan Tobias Mühlberg, and Frank Piessens. 2017. VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. In Proceedings of the 33rd Annual Computer Security Applications Conference (Orlando, FL, USA) (ACSAC 2017). Association for Computing Machinery, New York, NY, USA, 225--237. https://doi.org/10.1145/3134600.3134623
[57]
Eric Wang, William Xu, Suhas Sastry, Songsong Liu, and Kai Zeng. 2017. Hardware Module-Based Message Authentication in Intra-vehicle Networks. In 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS). 207--216.
[58]
Qiyan Wang and Sanjay Sawhney. 2014. VeCure: A practical security framework to protect the CAN bus of vehicles. In 2014 International Conference on the Internet of Things (IOT). 13--18. https://doi.org/10.1109/IOT.2014.7030108
[59]
Shuai Wang, Pei Wang, and Dinghao Wu. 2016. UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Vol. 1. 236--247. https://doi.org/10.1109/SANER.2016.106
[60]
Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, and Zhiqiang Lin. 2012. Securing Untrusted Code via Compiler-Agnostic Binary Rewriting. In Proceedings of the 28th Annual Computer Security Applications Conference (Orlando, Florida, USA) (ACSAC '12). Association for Computing Machinery, New York, NY, USA, 299--308. https://doi.org/10.1145/2420950.2420995
[61]
Haohuang Wen, Qi Alfred Chen, and Zhiqiang Lin. 2020. Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 949--965. https://www.usenix.org/conference/usenixsecurity20/presentation/wen
[62]
Matthias Wenzl, Georg Merzdovnik, Johanna Ullrich, and Edgar Weippl. 2019. From Hack to Elaborate Technique-A Survey on Binary Rewriting. ACM Comput. Surv., Vol. 52, 3, Article 49 (jun 2019), 37 pages. https://doi.org/10.1145/3316415
[63]
David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, and Vasileios P. Kemerlis. 2020. Egalito: Layout-Agnostic Binary Recompilation. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (Lausanne, Switzerland) (ASPLOS '20). Association for Computing Machinery, New York, NY, USA, 133--147. https://doi.org/10.1145/3373376.3378470
[64]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. DolphinAttack: Inaudible Voice Commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 103--117. https://doi.org/10.1145/3133956.3134052
[65]
Knut Ørland. 2015. Styreenhet. https://github.com/ION-Racing/Styreenhet

Cited By

View all
  • (2024)Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty VehiclesSAE Technical Paper Series10.4271/2024-01-2805Online publication date: 16-Apr-2024
  • (2024)Differential Fuzzing for Data Distribution Service Programs with Dynamic ConfigurationProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695073(807-818)Online publication date: 27-Oct-2024
  • (2022)Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)10.1109/QRS57517.2022.00091(864-873)Online publication date: Dec-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
May 2022
1291 pages
ISBN:9781450391405
DOI:10.1145/3488932
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2022

Check for updates

Author Tags

  1. authentication
  2. binary analysis
  3. control area network
  4. electronic control unit

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)316
  • Downloads (Last 6 weeks)36
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty VehiclesSAE Technical Paper Series10.4271/2024-01-2805Online publication date: 16-Apr-2024
  • (2024)Differential Fuzzing for Data Distribution Service Programs with Dynamic ConfigurationProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695073(807-818)Online publication date: 27-Oct-2024
  • (2022)Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)10.1109/QRS57517.2022.00091(864-873)Online publication date: Dec-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media