首页> 外文期刊>Vehicular Communications >SecMonQ.: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems
【24h】

SecMonQ.: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems

机译:SecMonQ .:基于HSM的安全监视方法,用于保护AUTOSAR安全关键系统

获取原文
获取原文并翻译 | 示例
           

摘要

Many attacks on vehicle systems that result in a safety hazard follow a general pattern in which ECU firmware is modified, or code is injected in order to send spoofed CAN messages to safety-critical components causing an unsafe driving situation. There is a general consensus that protecting vehicles requires a defense in depth approach where protections are added at each layer of the vehicle data architecture. At the vehicle CAN bus layer, two powerful countermeasures exist: message authentication/encryption and network intrusion detection systems. The two approaches assume that an attacker has already managed to reach the CAN bus and therefore attempt to limit his impact. To defend against CAN injection attacks, we propose an alternative approach which aims at stopping a CAN injection attack before it reaches the vehicle bus. The proposed approach, working at the ECU level, leverages the embedded hardware security module (HSM), available in modern automotive ECUs, to implement four security monitors (SecMonQ) that run within the HSM firmware. SecMonQ performs continuous monitoring activities of the ECU firmware integrity, communication peripherals, periodic task timing, and flow sequence of certain critical functions. It is designed to detect an active attack and bring the system back to a safe state within the safety defined fault tolerant time. We implement SecMonQ on an automotive development environment which consists of an Elektrobit AUTOSAR stack and a Renesas RH850 F1KM micro-controller. We evaluate SecMonQ against the CAN masquerading attack to demonstrate efficacy while maintaining compatibility with AUTOSAR. (C) 2019 Elsevier Inc. All rights reserved.
机译:导致安全隐患的对车辆系统的许多攻击遵循的通用模式是,修改ECU固件,或注入代码,以将欺骗的CAN消息发送到对安全至关重要的组件,从而导致不安全的驾驶情况。人们普遍认为,保护车辆需要深度防御方法,其中在车辆数据体系结构的每一层都添加了保护措施。在车辆CAN总线层,存在两个强大的对策:消息认证/加密和网络入侵检测系统。这两种方法都假定攻击者已经设法到达CAN总线,因此试图限制其影响。为了防御CAN注入攻击,我们提出了一种替代方法,旨在在CAN注入攻击到达车辆总线之前将其停止。提议的方法在ECU级别上起作用,它利用了现代汽车ECU中可用的嵌入式硬件安全模块(HSM)来实现在HSM固件中运行的四个安全监视器(SecMonQ)。 SecMonQ对ECU固件完整性,通信外围设备,定期任务定时以及某些关键功能的流程顺序进行连续监视。它旨在检测主动攻击,并在安全定义的容错时间内使系统返回安全状态。我们在由Elektrobit AUTOSAR堆栈和瑞萨RH850 F1KM微控制器组成的汽车开发环境中实施SecMonQ。我们评估SecMonQ免受CAN伪装攻击,以证明其功效,同时保持与AUTOSAR的兼容性。 (C)2019 Elsevier Inc.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号