Author:
Bodei Chiara,De Vincenzi Marco,Matteucci Ilaria
Abstract
AbstractThe widespread use of advanced driver assistance systems in modern vehicles, together with their integration with the Internet and other road nodes, has made vehicle more vulnerable to cyber-attacks. To address these risks, the automotive industry is increasingly focusing on the development of security solutions: formal methods and software verification techniques, which have been successfully applied to a number of safety-critical systems, could be a promising approach in the automotive area. In this work, we concentrate on in-vehicle communications, provided by many Electronic Control Units (ECUs) that work together thanks to serial protocols such as Controller Area Network (CAN). However, increasing connectivity exposes the internal network to a variety of cyber-risks. Our aim is to formally verify the AUTOSAR-based Basic Software module called CINNAMON, designed to ensure confidentiality, integrity, and authentication at the same time for traffic exchanged over CAN protocol. More precisely, it adds confidentiality guarantees to the Secure Onboard Communication (SecOC) module. We formally analyze CINNAMON with the verification tool Tamarin. Our analysis shows that CINNAMON could be an effective security solution, as it can ensure the desired properties, in particular, confidentiality in a send-receive scenario between two ECUs. Finally, we describe a potential application scenario.
Publisher
Springer Science and Business Media LLC
Reference39 articles.
1. Automated vehicles for safety. https://www.nhtsa.gov/technology-innovation/automated-vehicles-safety. Last accessed on May 29, 2024
2. Bella, G., Biondi, P., Costantino, G., Matteucci, I.: Cinnamon: a module for AUTOSAR secure onboard communication. In: 2020 16th European Dependable Computing Conference (EDCC), pp. 103–110 (2020). https://doi.org/10.1109/EDCC51268.2020.00026
3. Bella, G., Biondi, P., Costantino, G., Matteucci, I.: TOUCAN: a proTocol tO secUre Controller Area Network. CoRR (2021). https://arxiv.org/abs/2111.10642
4. Bella, G., Biondi, P., Costantino, G., Matteucci, I.: Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security. Comput. Netw. 109377, (2022). https://doi.org/10.1016/j.comnet.2022.109377
5. Birkinshaw, C., Rouka, E., Vassilakis, V.G.: Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. J. Netw. Comput. Appl., 71–85 (2019). https://doi.org/10.1016/j.jnca.2019.03.005
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Challenges of software verification: the past, the present, the future;International Journal on Software Tools for Technology Transfer;2024-08