Presented at
Still Hacking Anyway (SHA2017),
Aug. 5, 2017, 3 p.m.
(60 minutes).
Tesla Model S, Jeep Cherokee, Mitsubishi Outlander, Nissan Leaf… The list of hacked cars grows every day and security has become a priority in the automotive industry.
Until now, most of the security research and security development has been focusing in the higher layers of the software and in car interfaces like the WiFi, Bluetooth, USB or CAN. We, however, tried to assess security at lowest level possible: the microcontrollers in the ECUs.
#PhysicalSecurity #DeviceSecurity #IoT
New functionalities implemented in modern cars requires zero fault tolerance in the electric systems. A fail in the autopilot module, for example, can have fatal consequences. The ISO 26262 introduced in 2011 the ASIL (Automotive Safety Integrity Level) scheme, a risk classification system for functional safety. ASIL-D certified systems - the highest level of assurance - relies mostly in microcontrollers with redundant CPUs operating in a lockstep configuration. Although the ASIL-D requirements do not mention anything about security, is commonly thought that the lockstep configuration would prevent low-level attacks like fault injection (FI). We analyzed few examples of ASIL-D chips from different vendors and we found that the lockstep does not prevent fault injection. Moreover, we are able to apply FI to unlock the JTAG protection of an ASIL-D chip.
Presenters:
Links:
Similar Presentations: