38
© ZF Friedrichshafen AG Automotive Cybersecurity Validation Strategy 2020-12-10 | Nico Vinzenz | ZF Friedrichshafen AG

Automotive Cybersecurity Validation Strategy

  • Upload
    others

  • View
    17

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Automotive Cybersecurity Validation Strategy

2020-12-10 | Nico Vinzenz | ZF Friedrichshafen AG

Page 2: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 2

Why do we need an Automotive Validation Strategy?

Page 3: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Obligatory “Jeep in the ditch”-Picture

• Jeep Cherokee Hack

➢2015 by Miller and Valasek

3

Page 4: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

But the List goes on..

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 4

Tesla (2015): Remote vehicle unlock and start

Nissan (2016): Remote instrument panel control

Hyundai (2017): Remote vehicle unlock and start

Mercedes-Benz (2019): Remote vehicle unlock and start

Page 5: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Emerging Challenge – V2X Connectivity

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 5

Page 6: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 6© ZF Friedrichshafen AG

Emerging Challenge – AD Functionality

Page 7: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Emerging Challenge – E/E Architecture

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 7

Page 8: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Further Cybersecurity Challenges

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 8

Lifetime of

15+ YearsHardware

RestrictionsCompetitive

Profit Margins

Insecure Programming

Languages

Page 9: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Agenda

01 Automotive Development Process

02 Security Validation Strategies

03 Practical Application

04 Reducing Risks in the Future

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 9

Page 10: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 10

01Automotive Development Process

Page 11: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 11

SYS.2

System

Requirements

Analysis

SYS.5

System

Qualification Test

SYS.3

System

Architectural

Design

SYS.4

System

Integration and

Integration Test

SWE.1

Software

Requirements

Analysis

SWE.2

Software

Architectural

Design

SWE.3

Software Detailed

Design and Unit

Construction

SWE.4

Software Unit

Verification

SWE.5

Software

Integration and

Integration Test

SWE.6

Software

Qualification Test

Standard V-Model

Page 12: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

Cybersecurity V-Model

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 12

TARA• Threat Analysis and Risk Assessment (TARA)

➢Input: System Assets

➢Output: Security Goals

• Security Validation Strategies

➢Validate Security Goals

Page 13: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 13

02Security Validation Strategies

Page 14: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

TARA

Overview

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 14

Page 15: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

TARA

Overview

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 15

Fuzz Testing

Penetration

Testing

Vulnerability

Scanning

Functional

Testing

Testing against the “known”

Testing against the “unknown”

Page 16: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Requirement-based Approach

➢Translate functional requirements into test cases

➢Easy to find intended but not implemented behavior

➢Hard to find implemented but notintended behavior

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 16

TARA

Fuzz Testing

Penetration

Testing

Vulnerability

Scanning

Functional

Testing

Functional Testing

Page 17: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 17

Functional Testing

Intended Behaviour(Requirements)

Page 18: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 18

Functional Testing

Implemented Behaviour(Program Code)

Intended Behaviour(Requirements)

Page 19: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 19

Functional Testing

Easy:Positive Test Cases

Intended Behaviour(Requirements)

Implemented Behaviour(Program Code)

Page 20: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 20

Functional Testing

Easy:Positive Test Cases

Hard:Negative Test Cases

Intended Behaviour(Requirements)

Implemented Behaviour(Program Code)

Page 21: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Knowledge-DB Approach

➢Static/dynamic code analysis finds weaknesses

➢CVE-matching on Bill of Materials (BoM) finds vulnerabilities

➢Port scanner finds configuration mistakes

➢Oblivious to zero-day and product-unique exploits

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 21

TARA

Fuzz Testing

Penetration

Testing

Vulnerability

Scanning

Functional

Testing

Vulnerability Scanning

Page 22: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Testing into the Void

➢Interface supplied with semi-valid data

➢System monitored for suspicious behavior

➢Can find unknown vulnerabilities

➢Challenging to configure correctly and generate “evidence”

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 22

TARA

Fuzz Testing

Penetration

Testing

Vulnerability

Scanning

Functional

Testing

Fuzz Testing

Page 23: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 23

Fuzz Testing

Fuzz TestingTool

Software/System

Interfaces

Malformed Input

Page 24: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 24

Fuzz Testing

Fuzz TestingTool

Software/System

Interfaces

Malformed Input External Instrumentation

In-bandInstrumentation

Page 25: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 25

Fuzz Testing

Fuzz TestingTool

Software/System

Monitor

Interfaces

Feed-back Channel

Malformed Input External Instrumentation

In-band Instrumentation

Page 26: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Authorized Cyberattack

➢Security expert tries all available techniques within scope

➢Can find unknown vulnerabilities

➢High demand on effort and expertise makes it expensive

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 26

TARA

Fuzz Testing

Penetration

Testing

Vulnerability

Scanning

Functional

Testing

Penetration Testing

Page 27: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 27

Penetration Testing Large Budget

•Multiple experts

•High-tech lab for SCA

•Months of work

Small Budget

•“Script kiddies”

•Generic vulnerability scanner/fuzzer

•Days of work

Page 28: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Iterative Process

1. Findings flow back into the TARA

2. Adaption of security goals and requirements

3. Adaption of security validation strategies

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 28

Iterative Process

TARA

Page 29: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 29

03Practical Application

Page 30: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 30

Functional Testing

Hardware in the Loop (HiL)

• Execute test cases on …

➢SiL (Software in the Loop)

➢HiL (Hardware in the Loop)

Page 31: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 31

Vulnerability Scanning

Developer PC

Static/DynamicCode Analysis

BoM CVE-Matching

Page 32: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 32

Vulnerability Scanning

Incident Response Process

•Interface to supplier and “Responsible Disclosure” researcher

•PSIRT (Product Security Incident Response Team) ensures appropriate reaction

Page 33: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 33

Fuzz Testing

Software Unit Fuzzing

•X.509 certificates

•Custom written parser

•Data input

•Config files

System Interface Fuzzing

•CAN (FD)

•UDS

•Ethernet Stack

•IP, TCP, TLS/DTLS

Page 34: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 34

Penetration Testing

Project

ProjectStart

Start ofProduction

Security FeaturesFunctional

Page 35: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 35

Penetration Testing

Project

ProjectStart

Start ofProduction

Security FeaturesFunctional

Page 36: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 36

04Reducing Risks in the Future

Page 37: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG

• Upcoming regulation

➢UNECE WP.29 and ISO/SAE 21434

• CEP (Cybersecurity Engineering Process)

• Holistic Cybersecurity Concept

• LTS (Long Time Support)

2020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy 37

Reducing Risks in the Future

Page 38: Automotive Cybersecurity Validation Strategy

© ZF Friedrichshafen AG© ZF Friedrichshafen AG© ZF Friedrichshafen AG

Thank you!Questions?

ZF Friedrichshafen AG behält sich sämtliche Rechte an den gezeigten

technischen Informationen einschließlich der Rechte zur Hinterlegung von

Schutzrechtsanmeldungen und an daraus entstehenden Schutzrechten im

In- und Ausland vor.

ZF Friedrichshafen AG reserves all rights regarding the shown technical

information including the right to file industrial property right applications and

the industrial property rights resulting from these in Germany and abroad.

[email protected]

382020-12-10 | Nico Vinzenz | Automotive Cybersecurity Validation Strategy