Ebert Automotive Security PenTest 2022
Ebert Automotive Security PenTest 2022
net/publication/352059377
CITATIONS READS
4 1,223
2 authors:
All content following this page was uploaded by Christof Ebert on 19 August 2022.
Automotive vehicles are safety critical computers on wheels. The ongoing convergence of product IT
and enterprise IT creates high cybersecurity demands. With their immediate safety impact,
cyberattacks on such systems will endanger passengers. The automotive industry is using various
methods for security verification and validation. Yet, we realize that with classic security testing,
vulnerability detection is inefficient and incomplete. In this article, we show how an enhanced Grey-
Box Penetration Test (GBPT) needs less test cases while being more effective in terms of coverage
and indicating less false positives.
1. Penetration Testing
Penetration Testing (or pen testing in short) is particularly helpful to identify and mitigate
cybersecurity attacks which had not been considered during design. Current standardization with ISO
21434 and UNECE R.155 on CSMS and R.156 on SUMS enforces systematic risk mitigation
throughout the entire life cycle [1,2,3,4,5]. For security testing, they all devise classic testing
overlayed with dedicated security testing.
Typically, Penetration Testing also known as ethical hacking is performed in the validation stage of
the security and safety V model. To use it effectively, we will in this article show how to connect Pen
Tests with the left side of the V. The various stages are as follows: Scoping, information gathering
and reconnaissance, threat modelling, vulnerability analysis, exploitation, and reporting. Pen testers
need to think like a hacker and ethically penetrate the system to exploit and expose the vulnerabilities,
to allow mitigating these issues.
Pen testing is of three main types namely White-Box, classic Black-Box, and innovative Grey-Box
Pen Testing (GBPT). White-Box Pen testing approach is a full knowledge test where all source code
and all internal data of the system are available to the tester. Although this approach brings the most
results, it takes a lot of time and effort. Black-Box Pen Testing (BBPT) also called as Classic Pen
Test is a no knowledge test where the tester knows only the publicly available documents and
standards. Brute forcing is applied in this test. It also takes time and effort due to the demand to cover
a huge number of permutations of signals and scenarios.
Since hackers have a lot of architecture knowledge, software, and vulnerability information, they
attack the system by various paths. GBPT helps to make the system more robust to cyberattacks. In
GBPT, basic high-level architecture and result from Threat Analysis and Risk Assessment (TARA),
which is performed in the requirement stage as security analysis, is provided as input to perform the
GBPT. This approach takes less time and effort and is most advantageous than the classic BBPT in
the current scenario.
Classic BBPT, however, neither has a good traceability mechanism with respect to the functional
requirements nor does it consider the high-level architecture knowledge to ensure all vulnerabilities
and attack paths are covered. It has the drawback of not addressing the highest risk vulnerabilities
first. This traditional black-box penetration testing mechanism requires a lot of time and effort;
therefore, this calls for a revised testing scheme that is both effective and efficient.
Grey-Box Pen-Testing for Automotive Cybersecurity 2
We show in this AutoTest presentation a new greybox pen testing method and provide practical
examples from Vector security test labs.
The Grey-Box Pen Test can be divided into 10 steps for ease of implementation:
1) Extract system information. This involves basic features, user experience, but also negative
requirements (e.g., Misuse, Abuse und Confuse Cases). Features are deduced which is the starting
point of the formal traceability model.
2) Model basic architecture and interfaces. Determine the components of the product. These
components should be vertically traced to circuit level components for top-down recursive pen test.
3) Identify relevant assets. Use safety, operational performance, privacy, and legislation. Trace
features to an asset ID to ensure exhaustive coverage.
4) Analyze hardware and software specifications. Many specs for hardware, protocols, IP stacks etc.
are available online, and hackers will use those too. Use public vulnerabilities databases like Common
Vulnerabilities Exposure (CVE) to identify weakness.
Grey-Box Pen-Testing for Automotive Cybersecurity 3
5) Perform a Threat Analysis and Risk Assessment (TARA). Deduce damage scenarios by failing the
system test cases that are associated with the requirements via forward trace links towards attack
vectors.
6) Create a minimum viable pen test case repository. The attack vectors are traced via their IDs to
ensure a good test case coverage and generate a minimum and non-redundant pen test case repository.
7) Perform actual pen testing. Use the minimum viable test cases and report the valid and invalid
vulnerabilities.
8) Measure performance with KPIs. The number of valid vulnerabilities and the minimum viable test
cases are used to compute the KPIs for effectiveness and efficiency of the GBPT.
9) Distil further functional security requirements. Use the Triple Peak method to systematically
identify necessary security protection [6].
10) Perform Regression Testing. Each change demands regression testing which is most efficient
when using the traceability model which is created in the initial steps of GBPT.
Due to size restrictions in this article, this description is rather short and cookbook-style. For a more
detailed explanation of the underlying methods, we recommend our related webinars and articles [6].
On this basis we will apply a TARA (Threat Analysis and Risk Assessment). Our Vector
SecurityCheck and underlying security engineering methods have adopted the state of the practice in
security evaluation and proposed mitigation. Error! Reference source not found. It is using
significant research work from our worldwide security projects. It also uses external best practices,
such as EVITA, HEAVENS, and other proposed methods for security risk assessment in automotive
development [1,2].
Within this scope, the simplified use case scenarios comprise of:
Regular usage of car
Car diagnostics
After-sales enhancements
First, we analyze the assets. The following assets are present in the given architecture:
Switching function of switches
Filter function of switches
Filter and forward function of firewall
Cross-domain communication over switches and firewall
Normal operation of domains
Privacy-related data and intellectual property (IP)
Specific threats are derived in the scope of ethernet switch and connectivity:
Degenerate ECU performance
Accessing personal data, such as contacts, routes, etc.
Loss of data
Display wrong warnings to driver
Clone and introduce counterfeit parts by using valid part numbers
Chip tuning to improve ECU performance
Steal manufacturer’s IP
Installing non-authorized software to break safety of the vehicle
Disturb and distract driver (situation-specific)
Several attack vectors are identified in the scope of ethernet switch and connectivity:
Grey-Box Pen-Testing for Automotive Cybersecurity 5
Given the attack vectors and reference architecture, we can complete the prerequisites of the GBPT
with most common anticipated attacks, such as DoS, MAC Flooding, MAC Spoofing, eavesdropping,
VLAN hopping, and inject malware.
Based on the repeated GBPT, we can map suitable security mechanisms to mitigate critical security
risks, such as Firewall, VLAN, network segregation, IDS, Secure Boot, Secure Logging, Secure
Communication (e.g., MACs, MACSec), Encryption. The presented Security Goals are further
broken down to security requirements to enable implementation and testing. Suitable security
mechanisms shall be selected to implement security goals.
To institutionalize a viable regression strategy, we perform with each increment, a subset of the GBPT
and with each delivery, a SecurityCheck with residual risk analysis based on a given selected set of
design rules as part of an updated safety case. Fig. 4 provides an example from our case study.
Grey-Box Pen-Testing for Automotive Cybersecurity 6
Fig. 4: Residual risk analysis of automotive ethernet introduction with KPI from Vector
SecurityCheck
Criteria Grey-Box Pen Test (GBPT) Classic Black-Box Pen Test (BBPT)
Time and Time and effort are saved in the initial More time and effort spent performing pen
Effort stages of pen test like scoping, information test as knowledge of the internal
gathering and reconnaissance as knowledge architectural schematics is not known
of architecture and TARA is known
Attack tree Attack tree has a large test coverage with Attack tree contains many branches where
accuracy attack vectors aligning to the architecture some might even result in failed test cases
Number of Lesser cases of false positive vulnerabilities More false positive vulnerabilities as
false positive which leads to efficient exploitation architecture is not known hence lead to
vulnerabilities more time wasted during exploitation
Steps in test The steps involved in the test cases are Starting with vulnerability scanning to
case fewer, thus leading to lesser resource retrieve the open ports with subsequent
consumption, time, effort, and cost sequential exploit trials means more steps
within a single test case
Number of More vulnerabilities are identified, that is Without knowledge of architecture, it
vulnerabilities because it is aware of the architecture and could miss some of the crucial
hence covers all scenarios vulnerabilities as this testing approach is
not systematic and lacks traceability
Resource Resources are consumed in a prioritized Inefficient resource utilization due to
Consumption manner as the highest risk is addressed first. random utilization with high repetition in
brute-forcing
Traceability This results in a good traceability Since this strategy uses brute forcing, a
mechanism to link all functional good traceability mechanism cannot be put
requirements with the assets, then assets into place thereby leading to inefficient
with the threats and attack vectors and these and incomplete testing.
attack vectors are associated with test cases,
hence yielding a systematic and exhaustive
test strategy.
Fig. 5: Evaluating Grey-Box Pen Test vs. Classic Black-Box Pen Test
Effective cybersecurity demands systematic processes along the life cycle of both components and
the car itself, especially if their effectiveness must be proven at a later point due to legal actions. With
this article we strive to provide guidance for specific misuse cases and how to validate accordingly.
Our Grey-Box Pen Test (GBPT) has proven more efficient and effective than traditional validation
schemes. The mentality of engineers must change towards designing and validating for security –
rather than only for functionality. Enterprise IT has realized many years ago that isolated mechanisms,
such as distributed functionality in proprietary subsystems, protection on component-level, gateways
and firewalls between components, validation of critical functions, etc. are insufficient. It demands
intelligent testing with the perspective of an attacker. Think like a criminal and act as an engineer. Or
in the words of Henry Ford: “Who always does what he is already able to do, always remains what
he already is.” This would be too high a risk in automotive IT.
Grey-Box Pen-Testing for Automotive Cybersecurity 8
References
[1] Kim, S. and R. Shrestha: Automotive Cyber Security. Springer, 2020.
[2] ISO/SAE 21434. Road vehicles — Cybersecurity engineering.
https://www.iso.org/standard/70918.html
[3] UNECE: R.155 Cybersecurity Management System (CSMS).
https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-
and-cyber-security
[4] UNECE: R.156 Software Update Management System (SUMS).
https://unece.org/transport/documents/2021/03/standards/un-regulation-no-156-software-update-
and-software-update
[5] Ebert, C. and J.John: “Practical Cybersecurity with ISO 21434”. Springer. atz Elektronik. ISSN:
0001-2785, pp. 16-21, No. 2, Mrc/Apr. 2022.
[6] Ebert, C. and Ray, R.: Test-Driven Requirements Engineering. IEEE Software, ISSN: 0740-
7459, vol. 38, no. 1, pp. 16-24, Jan. 2021.
[7] Brennich, T. and Moser, M.: Putting Automotive Security to the Test. ATZelectronics
worldwide, ISSN: 2524-8804, vol.15, no.1, pp. 46-51, Jan. 2020.
[8] Ebert, C. and R. Ray: “Toward a Formal Traceability Model for Efficient Security Validation”.
IEEE Computer, pp. 68-78, vol. 54, ISSN: 0018-9162, Nov. 2021.
Authors
Christof Ebert is the managing director of Vector Consulting Services and a professor at the
University of Stuttgart and the Sorbonne in Paris. Contact him at christof.ebert@vector.com.
Ruschil Ray is a consultant with Vector Consulting Services. Prior to that, she worked for General
Motors. Contact her at ruschil.ray@vector.com
Florian Kanis is a senior consultant with Vector Consulting Services. Prior to that, he worked for in
AUTOSAR development. Contact him at florian.kanis@vector.com