TUM Logo

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks

High-end vehicles incorporate about one hundred computers; physical and virtualized ones; self-driving vehicles even more. This allows a plethora of attack combinations. This paper demonstrates how to assess exploitability risks of vehicular on-board networks via automatically generated and analyzed attack graphs. Our stochastic model and algorithm combine all possible attack vectors and consider attacker resources more efficiently than Bayesian networks. We designed and implemented an algorithm that assesses a compilation of real vehicle development documents within only two CPU minutes, using an average of about 100 MB RAM. Our proof of concept "Security Analyzer for Exploitability Risks" (SAlfER) is 200 to 5 000 times faster and 40 to 200 times more memory-efficient than an implementation with UnBBayes1. Our approach aids vehicle development by automatically re-checking the architecture for attack combinations that may have been enabled by mistake and which are not trivial to spot by the human developer. Our approach is intended for and relevant for industrial application. Our research is part of a collaboration with a globally operating automotive manufacturer and is aimed at supporting the security of autonomous, connected, electrified, and shared vehicles.

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks

Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018

Authors: Martin Salfer and Claudia Eckert
Year/month: 2018/8
Booktitle: Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018
Pages: 21:1--21:10
Publisher: ACM
Fulltext: click here

Abstract

High-end vehicles incorporate about one hundred computers; physical and virtualized ones; self-driving vehicles even more. This allows a plethora of attack combinations. This paper demonstrates how to assess exploitability risks of vehicular on-board networks via automatically generated and analyzed attack graphs. Our stochastic model and algorithm combine all possible attack vectors and consider attacker resources more efficiently than Bayesian networks. We designed and implemented an algorithm that assesses a compilation of real vehicle development documents within only two CPU minutes, using an average of about 100 MB RAM. Our proof of concept "Security Analyzer for Exploitability Risks" (SAlfER) is 200 to 5 000 times faster and 40 to 200 times more memory-efficient than an implementation with UnBBayes1. Our approach aids vehicle development by automatically re-checking the architecture for attack combinations that may have been enabled by mistake and which are not trivial to spot by the human developer. Our approach is intended for and relevant for industrial application. Our research is part of a collaboration with a globally operating automotive manufacturer and is aimed at supporting the security of autonomous, connected, electrified, and shared vehicles.

Bibtex:

@inproceedings { Salfer2018,
author = { Martin Salfer and Claudia Eckert},
title = { Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks },
year = { 2018 },
month = { August },
booktitle = { Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018 },
pages = { 21:1--21:10 },
publisher = { ACM },
url = { https://dl.acm.org/authorize?N664895 },

}