Don't brick your car: Firmware confidentiality and rollback for vehicles

In modern cars, there are a number of controllers that play a major role in the overall operations of the vehicles. The secure and updated firmware of these controllers is crucial to the overall security and reliability of the vehicle and its electronic system(s). Therefore, the life cycle of t...

Full description

Saved in:
Bibliographic Details
Main Authors: Mansor, Hafizah, Markantonakis, Konstantinos, Akram, Raja Naeem, Mayes, Keith
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2015
Subjects:
Online Access:http://irep.iium.edu.my/58087/7/58087.pdf
http://irep.iium.edu.my/58087/8/58087-Don%27t%20brick%20your%20car_SCOPUS.pdf
http://irep.iium.edu.my/58087/
http://doi.org/10.1109/ARES.2015.58
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In modern cars, there are a number of controllers that play a major role in the overall operations of the vehicles. The secure and updated firmware of these controllers is crucial to the overall security and reliability of the vehicle and its electronic system(s). Therefore, the life cycle of these controllers should be carefully managed. In this paper, we examine the vehicular firmware updates process and their associated security issues. We have analysed the security of the firmware update protocol proposed in the EVITA project, referred as EVITA protocol, which is considered as a main industrial effort in this field and found some potential shortcomings. Based on the analysis, in this paper we have suggested a number of improvements to the EVITA protocol, related with safety and security measures. The proposed improved protocol, also referred as EVITA+ protocol includes a rollback mechanism while preserving the confidentiality of the firmware. The integrity and authenticity of the flash driver are also considered in the EVITA+ protocol. The EVITA+ protocol is formally analysed using CasperFDR and Scyther to ensure the security of the firmware update process. Finally, we provide an insight analysis and our experience in relation to the efficiency, suitability and performance of the aforementioned tools in the field of automotive security.