Uptane: Securing Software Updates for Automobiles∗

نویسندگان

  • Trishank Karthik Kuppusamy
  • Akan Brown
  • Sebastien Awwad
  • Damon McCoy
  • Russ Bielawski
  • Cameron Mott
  • Sam Lauzon
  • André Weimerskirch
  • Justin Cappos
چکیده

Software update systems for automobiles can deliver significant benefits, but, if not implemented carefully, they could potentially incur serious security vulnerabilities. Previous solutions for securing software updates consider standard attacks and deploy widely understood security mechanisms, such as digital signatures for the software updates, and hardware security modules (HSM) to sign software updates. However, no existing solution considers more advanced security objectives, such as resilience against a repository compromise, or freeze attacks to the vehicle’s update mechanism, or a compromise at a supplier’s site. Solutions developed for the PC world do not generalize to automobiles for two reasons: first, they do not solve problems that are unique to the automotive industry (e.g., that there are many different types of computers to be updated on a vehicle), and second, they do not address security attacks that can cause a vehicle to fail (e.g. a man-in-themiddle attack without compromising any signing key) or that can cause a vehicle to become unsafe. In this paper, we present Uptane, the first software update framework for automobiles that counters a comprehensive array of security attacks, and is resilient to partial compromises. Uptane adds strategic features to the state-of-the-art software update framework, TUF, in order to address automotivespecific vulnerabilities and limitations. Uptane is flexible and easy to adopt, and its design details were developed together with the main automotive industry stakeholders in the USA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Software Updates for Automotives Using Uptane

Does secrecy improve security or impede securing software updates? The automotive industry has traditionally relied upon proprietary strategies developed behind closed doors. However, experience in the software security community suggests that open development processes can find flaws before they can be exploited. We introduce Uptane, a secure system for updating software on automobiles that fo...

متن کامل

Evaluating the Impact of Integrating a Security Module on the Real-Time Properties of a System

With a rise in the deployment of electronics in today’s systems especially in automobiles, the task of securing them against various attacks has become a major challenge. In particular, the most vulnerable points are: (i) communication paths between the Electronic Control Units (ECUs) and between sensors & actuators and the ECU, (ii) remote software updates from the manufacturer and the in-fiel...

متن کامل

Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices

Medical devices used for critical care are becoming increasingly reliant on software; however, little is understood about the security vulnerabilities facing medical devices and their software. To investigate this open question, we analyze the security of software that controls a modern Automated External Defibrillator (AED) used for treating cardiac arrhythmias. This report represents the firs...

متن کامل

Securing Binding Updates in Routing Optimizaton of Mobile IPv6

Mobile IPv6 (mipv6) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from Correspondent Node (CN) to a Mobile Node (MN) go first through the mobile node’s Home Agent (HA). Then the HA tunnels them to the MN’s foreign network. This process of delivering the...

متن کامل

Ip Routing for Wireless/mobile Hosts (mobileip) Wg

The IESG returned the Mobile IPv6 (MIPv6) draft to the working group due to concerns about the security and scalability of binding updates (BUs) sent to correspondent nodes and the associated IPsec processing that is specified in the draft. Since that time discussions have continued to attempt to define what is really needed to make binding updates secure while taking into consideration the asp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016