This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Identifying Security Vulnerabilities Early in the ECU Software Development Lifecycle
Technical Paper
2017-01-1657
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
In the past few years, automotive electronic control units (ECUs) have been the focus of many studies regarding the ability to affect the deterministic operation of safety critical cyber-physical systems. Researchers have been able to successfully demonstrate flaws in security design that have considerable, dramatic impacts on the functional safety of a target vehicle. With the rapid increase in data connectivity within a modern automobile, the attack surface has been greatly broadened to allow adversaries remote access to vehicle control system software and networks. This has serious implications, as a vast number of vulnerability disclosures released by security researchers point directly to common programming bugs and software quality issues as the root cause of successful exploits which can compromise the vehicle as a whole. In this paper, we aim to bring to light the most prominent categories of bugs found during the software development life cycle of an automotive ECU. We employ the method of static code analysis using reference coding standards such as MISRA and CERT C secure coding guidelines, to identify categories of software bugs which are most likely to remain in the vehicle, undetected as zero-day security vulnerabilities. We further examine the security issues originating from each category and provide an insight into the systematic elimination of crucial security-related bugs, much earlier in the software development life cycle. In the long term, we expect such an approach to drastically reduce the amount of attack vectors available for exploit in the ECU's software and limit the scope of damage possible by a malicious adversary.
Recommended Content
Authors
Citation
Edwards, J. and Kashani, A., "Identifying Security Vulnerabilities Early in the ECU Software Development Lifecycle," SAE Technical Paper 2017-01-1657, 2017, https://doi.org/10.4271/2017-01-1657.Also In
References
- Simplified implementation of the Microsoft SDL http://www.microsoft.com/sdl
- Secure Programming with Static Analysis Brian Chess and Jacob West 0-321-42477-8
- Secure Coding and MISRA C/C++ in ECU Development Jan Hollea ESCRYPT GmbH, Priyamvadha Vembar Bosch Center of Competence Security ETAS GmbH
- Computer Security Technology Planning Study Anderson James P. October 1972
- Exploiting Format String Vulnerabilities scut / team teso September 1 2001
- Dramatically Reducing Software Vulnerabilities Black Paul E. , Lee Badger , Barbara Guttman , Elizabeth Fong
- Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller Dr. , Chris Valasek
- Microsoft Using the Strsafe.h Functions http://msdn.microsoft.com/en-us/library/ms647466.aspx