CSW2017 jun li_car anomaly detection

63
Jun Li Twitter@bravo_fighter UnicornTeam Qihoo360 Automobile Intrusion Detection

Transcript of CSW2017 jun li_car anomaly detection

Page 1: CSW2017  jun li_car anomaly detection

Jun Li Twitter:@bravo_fighter UnicornTeam Qihoo360

Automobile Intrusion Detection

Page 2: CSW2017  jun li_car anomaly detection

2

What this talk is about?

Automotive intrusion detection Automotive cyber-security architecture

Page 3: CSW2017  jun li_car anomaly detection

3From the highest viewpointJ

Page 4: CSW2017  jun li_car anomaly detection

Outline

•  Quick recap of the status quo of car security research

•  Little automobile working principle •  CAN bus anomaly detection

Page 5: CSW2017  jun li_car anomaly detection

Performance Tuning by modifying firmware

Immobilizer Cracking (Hitag,Keeloq)

DARPA&UW OBD interface attack,etc. Karl et al.

Remote attack via wireless OBD interface

Telsa Qihoo360

BMW ConnectedDrive

vuln

Mbrace Jeep Uconnect Charlie&Chris

GM Onstar Vuln,Sammy More to

come ? Sure!

Car hacking development

Page 6: CSW2017  jun li_car anomaly detection

Car explained

Page 7: CSW2017  jun li_car anomaly detection

Sensor security

Page 8: CSW2017  jun li_car anomaly detection

In automotive electronics, Electronic Control Unit (ECU) is a generic term for any secret system that controls one or more of the electrical system or subsystems in a transport vehicle Types of ECU include Electronic/engine Control Module (ECM), Powertrain Control Module (PCM), Transmission Control Module (TCM), Brake Control Module (BCM or EBCM), Central Control Module (CCM), Central Timing Module (CTM), General Electronic Module (GEM), Body Control Module (BCM), Suspension Control Module (SCM), control unit, or control module

ECU (Electronic Control Unit)

Page 9: CSW2017  jun li_car anomaly detection

Electronic Control Module Example 9

Page 10: CSW2017  jun li_car anomaly detection

Automotive Mechatronics 10

Page 11: CSW2017  jun li_car anomaly detection

Non-hackable hackable

11

Throttle position sensor

Drive-by-wire system

Page 12: CSW2017  jun li_car anomaly detection

12

Steering-by-wire system

Universal joint

Steer-by –wire (with mechanical fallback clutch)

Page 13: CSW2017  jun li_car anomaly detection

Automotive Control System Architecture

Page 14: CSW2017  jun li_car anomaly detection

Vehicle CAN BUS System

Page 15: CSW2017  jun li_car anomaly detection

Vehicle Communication System

OBDII

MOST LIN CAN FlexRay Bluetooth Wifi SubGHz

Infotainment System

Page 16: CSW2017  jun li_car anomaly detection

ESP TCU ACC

ESP(electronic stability program)

TCU(transmission control unit)

ACC(adaptive cruise control)

… CAN-C

网关

Speedometer

CAN-B

Infotainment System

Music Player

INS(Inertial navigation system)

INS

EMU

EMU(engine management system)

Seat Controller

Vehicle Communication System example

Page 17: CSW2017  jun li_car anomaly detection

CAN BUS Signaling

Page 18: CSW2017  jun li_car anomaly detection

CAN Frame Structure

Page 19: CSW2017  jun li_car anomaly detection

0 dominant 1 recessive

1 1 1

1

0 1

1

1

1 0

0

0

1

1

1 0 0

0 0

0 0

CAN Bus Access Arbitration

Page 20: CSW2017  jun li_car anomaly detection

Packets injection Parameter spoofing

CAN BUS Attack

Page 21: CSW2017  jun li_car anomaly detection

Jeep Uconnect Vulnerability

WiFi femotocell Sprint Internet CAN

Remote Attack Example

Page 22: CSW2017  jun li_car anomaly detection
Page 23: CSW2017  jun li_car anomaly detection
Page 24: CSW2017  jun li_car anomaly detection

Automotive intrusion detection researches

Page 25: CSW2017  jun li_car anomaly detection

Automotive intrusion detection researches

Not considering Temporal feature

Page 26: CSW2017  jun li_car anomaly detection
Page 27: CSW2017  jun li_car anomaly detection

Distributed architecture

Page 28: CSW2017  jun li_car anomaly detection

CAN总线安全防御模型

IDS

IDS(Intrusion Detection System)

Page 29: CSW2017  jun li_car anomaly detection

① Real time requirements② Hard to trace back to sender③ High cost of false positive④ …

Difficulties of CAN bus defence

Page 30: CSW2017  jun li_car anomaly detection

CAN Anomaly Detection McAfee&Intel

Page 31: CSW2017  jun li_car anomaly detection

CAN bus defence

IDS

Page 32: CSW2017  jun li_car anomaly detection

CAN security architecture

Bluetooth WiFi Cellular V2X

IDS

Page 33: CSW2017  jun li_car anomaly detection

Experiment Car

•  Cellular Connection •  Cloud Service •  Bluetooth Key

•  Hybrid •  Electronic Brake •  Electric Power

Steering •  Electronic Throttle

Page 34: CSW2017  jun li_car anomaly detection

Experiment car’s CAN network

Page 35: CSW2017  jun li_car anomaly detection

The CAN database

Page 36: CSW2017  jun li_car anomaly detection

Why don’t we build a model Take the relation ship of rpm and speed ,gear for example,we can create a model of the System‘s behavior

Page 37: CSW2017  jun li_car anomaly detection

汽车工作原理

Page 38: CSW2017  jun li_car anomaly detection

Anomaly detection system

Realtime data stream

Cross Prediction

Parameter extraction

Page 39: CSW2017  jun li_car anomaly detection

System model requirements

Gear

Page 40: CSW2017  jun li_car anomaly detection

Build the system model

Data Collection

Data preprocess

Data analysis

Feature Selection

Model Training &Testing

Page 41: CSW2017  jun li_car anomaly detection

Data Acquisition Parameter presence on different BUS

Parameter SpeedEngine

RPM

Acceleration

Pedal

Intake

Pressure

Brake

Pedal

Steering

WheelGear

BUS

Instrument o o x x o o o

Comfort o o x x o x x

Power o o o o o x x

ECM o o o o o x o

ESC o o o x o o o

Page 42: CSW2017  jun li_car anomaly detection

Data Acquisition Setup

Page 43: CSW2017  jun li_car anomaly detection

Data Analysis Can database is kept highly confidential

Page 44: CSW2017  jun li_car anomaly detection

Data Preprocess

Page 45: CSW2017  jun li_car anomaly detection

Data Preprocess

Interpolation

Sampling

Normalization

Page 46: CSW2017  jun li_car anomaly detection

Normalization

Must make sure the maximum and minimum value,don’t calculate from the training data

Page 47: CSW2017  jun li_car anomaly detection

数据插值

Observation

Interpolation

Page 48: CSW2017  jun li_car anomaly detection

Sub-Sampling

Page 49: CSW2017  jun li_car anomaly detection

Sub-Sampling Time_ms

RPM Speed MAP MAF AccPedal Throttle

138973

0.2879838

0.1342592

0.0590551

0.1675675

0.6971070

0.1377952

138974

0.2873125

0.1342592

0.0551181

0.1675675

0.6971070

0.1377952

138975

0.2873125

0.1342592

0.0511811

0.1675675

0.6971070

0.1377952

138976

0.285970 0.1342592

0.0472440

0.1675675

0.6971070

0.1377952

138977

0.285970 0.134259 0.0511811

0.1675675

0.6971070

0.1377952

Page 50: CSW2017  jun li_car anomaly detection

Sub-Sampling

Page 51: CSW2017  jun li_car anomaly detection

Model training

Page 52: CSW2017  jun li_car anomaly detection

Model training

Page 53: CSW2017  jun li_car anomaly detection

Results

Page 54: CSW2017  jun li_car anomaly detection

Result

Page 55: CSW2017  jun li_car anomaly detection

Model testing

Page 56: CSW2017  jun li_car anomaly detection

Model testing

Page 57: CSW2017  jun li_car anomaly detection

Acknowledgement

Professor Shuicheng Yan Doctor Ming Lin Doctor Zhanyi Wang Doctor Lin Huang

Page 58: CSW2017  jun li_car anomaly detection

Thank You!

Q&A

Page 59: CSW2017  jun li_car anomaly detection

Reference

Page 60: CSW2017  jun li_car anomaly detection

1.  Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010

2.  Stephen Checkoway,Damon McCoy,Brian Kantor, Comprehensive Experimental Analyses of Automotive Attack Surfaces,2011.

3.  Charlie Miller,Chris Valasek,Adventures in Automotive Networks and Control Units,2013.

4.  Charlie Miller,Chris Valasek,Remote Exploitation of an Unaltered Passenger Vehicle,2015

5.  Dieter Spaar,Sicherheitslücken bei BMWs ConnectedDrive/ Beemer, Open Thyself! – Security vulnerabilities in BMW's ConnectedDrive,2015.

6.  Iamthecarvalry.org , Five Star Automotive Cyber Safety Framework,2015. 7.  Pierre Kleberger,Security Aspects of the In-Vehicle Network in the Connected

Car,IEEE Intelligent Vehicles Symposium,2011 8.  Marc Rogers,Kevin Mahaffey,How to Hack a Tesla Model S,DEF CON

23,2015 9.  Charlie Miller Chris Valasek,Advanced CAN Injection Techniques for Vehicle

Networks,BlackhatUSA,2016 10. Kyong-Tak Cho and Kang G. Shin, Fingerprinting Electronic Control Units for

Vehicle Intrusion Detection, 2016

Page 61: CSW2017  jun li_car anomaly detection

11. Nobuyasu Kanekawa,X-by-Wire Systems,Hitachi Research Lab.2011 12. Paul Yih, Steer-by-Wire: Implication For Vehicle Handling and Safety,Stanford

PHD Dissertation,2005 13. Luigi Coppolion,Dependability aspects of automotive x-by-wire technologies,

2008. 14. Jonas Zaddach,Andrei Costin,Embedded Devices Security and Firmware Reverse

Engineering,Blackhat Workshop,2013. 15. Andrei costin,Jonas Zaddach,A large-Scale Analysis of the Security of

Embedded Firmwares,EURECOM,2014. 16. Samy Kamkar,Drive It Like You hacked It,DEF CON23,2015 17. David A Brown, Geoffrey Cooper, Automotive Security Best Practices, White

Paper by Intel & McAfee,2014. 18. OpenGarages, Car Hacker’s Handbook,openGarage.org,2014. 19. Henning Olsson, OptimumG,Vehicle Data Acquisition Using CAN,2010 20. Varun Chandola,Arindam Banerjee,Vipin Kumar,Anomaly Detection :A

Survey,2009

Page 62: CSW2017  jun li_car anomaly detection

21. Park, Ming Kuang, Neural learning of driving environment prediction for vehicle power management, Joint Conf. on Neural Networks, 2008.

22. Taylor, P., Adamu-Fika, F., Anand, S., Dunoyer, A., Griffiths, N., and Popham, T. Road type classification through data mining,2012.

23. Michael Muter, Naim Asaj,Entropy-based anomaly detection for in-vehicle networks", IEEE Intelligent Vehicles Symposium (IV), 2011.

24. Ulf E. Larson, Dennis K. Nilsson,An Approach to Specification-based Attack Detection for In-Vehicle Networks, IEEE Intelligent Vehicles Symposium,2008.

25. Y. L. Murphey, Zhi Hang Chen, L. Kiliaris, Jungme ,I. Tang and T. P. Breckon, Automatic road environment classication, IEEE Trans. on Intelligent Transportation Systems, 2011.

26. Salima Omar, Asri Ngadi, Hamid H.Jebur, Machine Learning Techniques for Anomaly Detection: An Overview.

27. Perter Harrington,Machine Learning In Action,2013. 28. Jurgen Schmidhuber, Deep learning in neural networks: An overview, 2015. 29. Kaiserslautern,Comparison of Unsupervised Anomaly Detection Techniques,

German Research Center for Artificial Intelligence, 2011

Page 63: CSW2017  jun li_car anomaly detection

30. Sepp Hochreiter, Jurgen Schmidhuber, Long short-term memory,Neural computation, 1997.

31. Michael Husken, Peter Stagge,Recurrent neural networks for time series classifcation, Neurocomputing, 2003.

32. Felix A Gers, Jurgen Schmidhuber, Fred Cummins, Learning to forget:Continual prediction with LSTM, Neural computation, 2000.

33. David E Rumelhart, Geo_rey E Hinton, and Ronald J Williams.,Learning internal representations by error propagation,1985.

34. Christopher M Bishop,Pattern recognition and machine learning, springer, 2006. 35. Simon Haykin and Neural Network. A comprehensive foundation. Neural

Networks, 2004. 36. Eleazar Eskin,Andrew Arnold,Michael Prerau, A Geometric Framework for

Unsupervised Anomaly Detection-Detecting Intrusions in Unlabeled Data tection-Detecting Intrusions in Unlabeled Data,2002.

37. Kingsly Leung, Christopher Leckie, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, 2005