SecMonQ: An HSM based security monitoring approach for protecting AUTOSAR safety-critical systems

被引:4
|
作者
Nasser, Ahmad M. K. [1 ]
Ma, Di [1 ]
机构
[1] Univ Michigan, Comp Informat Sci, Dearborn, MI 48128 USA
关键词
Cyber physical systems; HSM; Trusted computing; Security monitors; Safety-critical systems;
D O I
10.1016/j.vehcom.2019.100201
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Many attacks on vehicle systems that result in a safety hazard follow a general pattern in which ECU firmware is modified, or code is injected in order to send spoofed CAN messages to safety-critical components causing an unsafe driving situation. There is a general consensus that protecting vehicles requires a defense in depth approach where protections are added at each layer of the vehicle data architecture. At the vehicle CAN bus layer, two powerful countermeasures exist: message authentication/encryption and network intrusion detection systems. The two approaches assume that an attacker has already managed to reach the CAN bus and therefore attempt to limit his impact. To defend against CAN injection attacks, we propose an alternative approach which aims at stopping a CAN injection attack before it reaches the vehicle bus. The proposed approach, working at the ECU level, leverages the embedded hardware security module (HSM), available in modern automotive ECUs, to implement four security monitors (SecMonQ) that run within the HSM firmware. SecMonQ performs continuous monitoring activities of the ECU firmware integrity, communication peripherals, periodic task timing, and flow sequence of certain critical functions. It is designed to detect an active attack and bring the system back to a safe state within the safety defined fault tolerant time. We implement SecMonQ on an automotive development environment which consists of an Elektrobit AUTOSAR stack and a Renesas RH850 F1KM micro-controller. We evaluate SecMonQ against the CAN masquerading attack to demonstrate efficacy while maintaining compatibility with AUTOSAR. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Security and Reliability of Safety-Critical RTOS
    Luna R.
    Islam S.A.
    [J]. SN Computer Science, 2021, 2 (5)
  • [22] Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks
    Hasan, Monowar
    Mohan, Sibin
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 8 - 14
  • [23] A component-based approach to specify hazards in the design of safety-critical systems
    Lu, SR
    Halang, WA
    Schmidtt, HW
    Gumzej, R
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 680 - 685
  • [24] A TASM-Based Requirements Validation Approach for Safety-Critical Embedded Systems
    Zhou, Jiale
    Lu, Yue
    Lundqvist, Kristina
    [J]. RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2014, 2014, 8454 : 43 - 57
  • [25] Live State-of-Health Safety Monitoring for Safety-Critical Automotive Systems
    Strasser, Andreas
    Stelzer, Philipp
    Steger, Christian
    Druml, Norbert
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 102 - 107
  • [26] Dependability of safety-critical systems
    Buja, G
    Castellan, S
    Menis, R
    Zuccollo, A
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), VOLS. 1- 3, 2004, : 1561 - 1566
  • [27] Are your systems safety-critical?
    Redmill, F
    [J]. IEE REVIEW, 1997, 43 (03): : 93 - &
  • [28] Certification of Safety-Critical Systems
    Leveson, Nancy G.
    Thomas, John P.
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (10) : 22 - 26
  • [29] Safety-critical systems design
    Douglass, BP
    [J]. ELECTRONIC ENGINEERING, 1998, 70 (862): : 45 - +
  • [30] SAFETY-CRITICAL SYSTEMS - INTRODUCTION
    BENNETT, P
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 1994, 5 (01): : 5 - 5