This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Securing the On-Board Diagnostics Port (OBD-II) in Vehicles

Journal Article
11-02-02-0009
ISSN: 2572-1046, e-ISSN: 2572-1054
Published August 18, 2020 by SAE International in United States
Securing the On-Board Diagnostics Port (OBD-II) in Vehicles
Sector:
Citation: Ammar, M., Janjua, H., Thangarajan, A., Crispo, B. et al., "Securing the On-Board Diagnostics Port (OBD-II) in Vehicles," SAE Int. J. Transp. Cyber. & Privacy 2(2):83-106, 2019, https://doi.org/10.4271/11-02-02-0009.
Language: English

References

  1. Itabashi , T. and Makino , A. Nov. 9, 2004
  2. Davis , R.I. , Burns , A. , Bril , R.J. , and Lukkien , J.J. Controller Area Network (can) Schedulability Analysis: Refuted, Revisited and Revised Real-Time Systems 35 3 239 272 2007
  3. Viriyasitavat , W. , Boban , M. , Tsai , H.-M. , and Vasilakos , A. Vehicular Communications: Survey and Challenges of Channel and Propagation Models IEEE Vehicular Technology Magazine 10 2 55 66 2015
  4. ENISA 2016
  5. Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. , Kohno , T. , Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. , Shacham , H. et al. Experimental Security Analysis of a Modern Automobile Security and Privacy (SP), 2010 IEEE Symposium on. IEEE Berkeley/Oakland, CA, USA 2010 447 462
  6. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. , Shacham , H. , Savage , S. , Koscher , K. , Czeskis , A. , Roesner , F. , Kohno , T. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco 2011 77 92
  7. Miller , C. , and Valasek , C. A Survey of Remote Automotive Attack Surfaces Black Hat USA 2014 94 2014
  8. Petit , J. , and Shladover , S.E. Potential Cyberattacks on Automated Vehicles IEEE Transactions on Intelligent Transportation Systems 16 2 546 556 2015
  9. Bernardini , C. , Asghar , M.R. , and Crispo , B. Security and Privacy in Vehicular Communications: Challenges and Opportunities Vehicular Communications 10 13 28 2017
  10. Miller , C. , and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 2015 91 2015
  11. Miller , C. , and Valasek , C. Adventures in Automotive Networks and Control Units Def Con 21 260 246 2013
  12. Klinedinst , D. and King , C. 2016
  13. Wen , H. , Chen , Q.A. , and Lin , Z. Plug-n-pwned: Comprehensive Vulnerability Analysis of obd-ii Dongles as a New Over-the-air Attack Surface in Automotive IOT 29th {USENIX} Security Symposium ({USENIX} Security 20) Boston, USA 2020
  14. a U t OSAR 2018
  15. 2020 https://github.com/m3mmar/secure-OBD-II
  16. Tuohy , S. , Glavin , M. , Hughes , C. , Jones , E. et al. Intra-vehicle Networks: A Review IEEE Transactions on Intelligent Transportation Systems 16 2 534 545 2015
  17. ISO 2015
  18. SAE 2013 https://www.sae.org/standards/content/j2012_201303/
  19. SAE 2001 https://www.sae.org/standards/content/j1962_201207/
  20. McCord , K. Automotive Diagnostic Systems: Understanding OBD I and OBD II S-A Design 2011 978-1934709061
  21. Smith , C. The Car Hacker’s Handbook: A Guide for the Penetration Tester starch press 2016 9781593277031
  22. ISO 2013
  23. Ring , M. , Rensen , T. , and Kriesten , R. Evaluation of Vehicle Diagnostics Security-implementation of a Reproducible Security Access SECURWARE 2014 Lisbon, Portugal 2014 213
  24. AUTOCAR 2015 https://www.autocar.co.uk/car-news/industry/how-crooks-can-steal-your-car-without-key/
  25. ExtremeTech 2012 http://www.extremetech.com/extreme/132526-hack-the-diagnostics-connector-steal-yourself-a-bmw-in-3-minutes
  26. Argus Cyber Security 2014 https://argus-sec.com/remote-attack-aftermarket-telematics-service/
  27. Argus Cyber Security 2017 https://argus-sec.com/remote-attack-bosch-drivelog-connector-dongle
  28. Markham , T.R. , and Chernoguzov , A. A Balanced Approach for Securing the OBD-ii Port SAE Technical Paper 2017-01-1662 2017 https://doi.org/10.4271/2017-01-1662
  29. AUTOSAR 2018
  30. Ferraiolo , D.F. , Sandhu , R. , Gavrila , S. , Kuhn , D.R. , and Chandramouli , R. Proposed NIST Standard for Role-based Access Control ACM Transactions on Information and System Security (TISSEC) 4 3 224 274 2001
  31. 2014
  32. Burgardt , C.A.P. 2018
  33. Tan , H. , Ma , M. , Labiod , H. , Boudguiga , A. et al. A Secure and Authenticated Key Management Protocol (sa-kmp) for Vehicular Networks IEEE Transactions on Vehicular Technology 65 12 9570 9584 2016
  34. ISO 2016 https://www.iso.org/standard/66574.html
  35. Infineon Technologies 2018 https://www.infineon.com/dgdl/Infineon-TriCore_Family_BR-2018-BC-v03_00-EN.pdf?fileId=5546d4625d5945ed015dc81f47b436c7
  36. STMicroelectronics 2018 https://www.st.com/en/automotive-microcontrollers/spc560d30l3.html
  37. Ammar , M. , Crispo , B. , Jacobs , B. , Hughes , D. , and Daniels , W. Sμv-the Security Microvisor: A Formally-verified Software-based Security Architecture for the Internet of Things IEEE Transactions on Dependable and Secure Computing 16 5 885 901 2019
  38. Thangarajan , A.S. , Ammar , M. , Crispo , B. , and Hughes , D. Towards Bridging the Gap between Modern and Legacy Automotive ecus: A Software-based Security Framework for Legacy ecus 2019 IEEE 2nd Connected and Automated Vehicles Symposium (CAVS). IEEE Honolulu, Hawaii, USA 2019 1 5
  39. Koeune , F. and Standaert , F.X. A Tutorial on Physical Security and Side-Channel Attacks Aldini , A. , Gorrieri , R. , and Martinelli , F. Foundations of Security Analysis and Design III Berlin, Heidelberg: Springer 2005 https://doi.org/10.1007/11554578_3
  40. Atmel 2008 http://ww1.microchip.com/downloads/en/devicedoc/doc4381.pdf
  41. Atmel 2008 http://ww1.microchip.com/downloads/en/devicedoc/doc7679.pdf
  42. NXP 2010 http://cache.freescale.com/files/microcontrollers/doc/user_guide/TRKMPC5604BEVBUM.pdf?fpsp=1
  43. NXP 2017 https://www.nxp.com/docs/en/data-sheet/MPC5606B.pdf
  44. Certicom Corp. 2009
  45. AUTOSAR 2018

Cited By