Abstract The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag control system as well as the central gateway. These results are supplemented in this article by a classification of these four attack scenarios using the established CERT taxonomy and an analysis of underlying security vulnerabilities, and especially, potential safety implications. With respect to the results of these tests, in this article we further discuss two selected countermeasures to address basic weaknesses exploited in our tests. These are adaptations of intrusion detection (discussing three exemplary detection patterns) and IT-forensic measures (proposing proactive measures based on a forensic model). This article discusses both looking at the four attack scenarios introduced before, covering their capabilities and restrictions. While these reactive approaches are short-term measures, which could already be added to today’s automotive IT architecture, long-term concepts also are shortly introduced, which are mainly preventive but will require a major redesign. Beneath a short overview on respective research approaches, we discuss their individual requirements, potential and restrictions.
[1]
H. Zimmermann,et al.
OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection
,
1980,
IEEE Transactions on Communications.
[2]
Scott A. Rotondo.
Trusted Computing Group
,
2011,
Encyclopedia of Cryptography and Security.
[3]
Jana Dittmann,et al.
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
,
2008,
Reliab. Eng. Syst. Saf..
[4]
Johnny S. Wong,et al.
A taxonomy of intrusion response systems
,
2007,
Int. J. Inf. Comput. Secur..
[5]
Tobias Hoppe,et al.
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats
,
2009,
SAFECOMP.
[6]
Jana Dittmann,et al.
A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump
,
2009,
2009 16th International Conference on Digital Signal Processing.
[7]
Jana Dittmann,et al.
Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags
,
2008,
Sicherheit.
[8]
Eoghan Casey,et al.
Digital Evidence and Computer Crime
,
2000
.
[9]
André Weimerskirch,et al.
State of the Art: Embedding Security in Vehicles
,
2007,
EURASIP J. Embed. Syst..