This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Vehicle Diagnostics Adapter Cybersecurity Concerns with Wireless Connectivity
Technical Paper
2023-01-0034
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
Maintaining and diagnosing vehicle systems often involves a technician connecting a service computer to the vehicle diagnostic port through a vehicle diagnostics adapter (VDA). This creates a connection from the service software to the vehicle network through a protocol adapter. Often, the protocols for the personal computer (PC) hosted diagnostic programs use USB, and the diagnostic port provides access to the controller area network (CAN). However, the PC can also communicate to the VDA via WiFi or Bluetooth. There may be scenarios where these wireless interfaces are not appropriate, such as maintaining military vehicles. As such, a method to defeature the wireless capabilities of a typical vehicle diagnostic adapter is demonstrated without access to the source code or modifying the hardware. The process of understanding the vehicle diagnostic adapter system, its hardware components, the firmware for the main processor and subsystems, and the update mechanism is explored. Once the system and binary firmware were understood, a binary patch was created and deployed to the VDA to render the wireless features inoperable while maintaining the existing USB functionality. A series of functional tests were run on the system before and after the patching process, with the results showing that only the targeted wireless functionality was removed and other functions performed as expected. With the ability to patch the VDA demonstrated, the paper concludes by inserting additional features and functions for the VDA, which show how the VDA can be co-opted for offensive cyber operations (for example, manipulating engine hours or vehicle identification number). This exercise confirms the necessity of a more restrictive cybersecurity posture in automotive peripherals with access to critical systems, in particular VDAs, and especially when such peripherals present a wireless interface.
Authors
Topic
Citation
Larson, E., Ford, W., Lerner, S., and Daily, J., "Vehicle Diagnostics Adapter Cybersecurity Concerns with Wireless Connectivity," SAE Technical Paper 2023-01-0034, 2023, https://doi.org/10.4271/2023-01-0034.Also In
References
- Cui , A. 2015 10.7916/D8NS0TN9
- Red Balloon Security 2023 https://ofrak.com/
- Khurram , M. , Kumar , H. , Chandak , A. , Sarwade , V. et al. Enhancing Connected Car Adoption: Security and Over the Air Update Framework 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) 2016 194 198 10.1109/WF-IoT.2016.7845430
- Cui , A. , and Stolfo , S.J. Defending Embedded Systems with Software Symbiotes Proceedings of the 14th international conference on Recent Advances in Intrusion Detection Berlin, Heidelberg 2011 358 377 10.1007/978-3-642-23644-0_19
- Checkoway , S. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security 2011 16 http://www.autosec.org/pubs/cars-usenixsec2011.pdf
- ATA’s Technology Maintenance Council RP1210: Windows API 2020-2021 Recommended Practices Manual 2020
- Cui , A. DEF CON 20 - Embedded Device Firmware Vulnerability Hunting Using FRAK 2023 http://www.everysession.com/defcon/def-con-20/def-con-20-ang-cui-embedded-device-firmware-vulnerability-hunting-using-frak/
- Rinard , M. Manipulating Program Functionality to Eliminate Security Vulnerabilities Jajodia , S. , Ghosh , A.K. , Swarup , V. , Wang , C. et al. Moving Target Defense 54 New York, NY Springer New York 2011 109 115 10.1007/978-1-4614-0977-9_6
- Dadam , S.R. , Zhu , D. , Kumar , V. , Ravi , V. et al. Onboard Cybersecurity Diagnostic System for Connected Vehicles SAE Powertrains, Fuels & Lubricants Digital Summit 2021 10.4271/2021-01-1249
- Studnia , I. , Nicomette , V. , Alata , E. , Deswarte , Y. et al. Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W) 2013 1 12 10.1109/DSNW.2013.6615528