Abstract
The ever increasing number of electronic control units inside a car demanded more complex buses with higher bandwidth capacities. But even the more recently designed in-vehicle network protocols, e.g., FlexRay, were engineered in thse absence of security concerns and thus they are highly vulnerable to adversarial interventions. In this work, we study the FlexRay protocol specification to identify features that can be used to mount various attacks. The attacks exploit both the physical layer and the data-link layer of the protocol to discard messages from the bus, i.e., DoS attacks, or to spoof messages by inserting adversarial frames and later discarding the genuine frames. We illustrate the feasibility of these attacks on an experimental setup composed of several FlexRay nodes implemented on automotive-grade controllers. While these attacks may not be a surprise, recognizing them may be relevant in preventing potential future exploits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
FlexRay Communications System - Electrical Physical Layer Specification, Version 3.0.1. Standard, FlexRay Consortium (2010)
FlexRay Communications System - Protocol Specification, Version 3.0.1. Standard, FlexRay Consortium (2010)
Armengaud, E., Steininger, A., Horauer, M.: Automatic parameter identification in FlexRay based automotive communication networks. In: IEEE Conference on Emerging Technologies and Factory Automation, ETFA 2006, pp. 897–904. IEEE (2006)
Checkoway, S., McCoy, D., Kantor, B., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium (2011)
Cho, K.T., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1044–1055. ACM (2016)
Heinz, M., Höss, V., Müller-Glaser, K.D.: Physical layer extraction of FlexRay configuration parameters. In: IEEE/IFIP International Symposium on Rapid System Prototyping, RSP 2009, pp. 173–180. IEEE (2009)
Huse, M.I.: FlexRay analysis, configuration parameter estimation, and adversaries. Master’s thesis, NTNU (2017)
ISO: 17458-1, Road vehicles - FlexRay communications system - part 1: general information and use case definition. Standard, International Organization for Standardization (2013)
ISO: 17458-2, Road vehicles - FlexRay communications system - part 2: data link layer specification. Standard, International Organization for Standardization (2013)
ISO: 17458-4, Road vehicles - FlexRay communications system - part 4: electrical physical layer specification. Standard, International Organization for Standardization (2013)
Koscher, K., Czeskis, A., Roesner, F., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)
Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEF CON 21, 260–264 (2013)
Murvay, P.S., Groza, B.: DoS attacks on controller area networks by fault injections from the software layer. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES 2017), 3rd International Workshop on Secure Software Engineering (2017)
Nilsson, D.K., Larson, U.E., Picasso, F., Jonsson, E.: A first simulation of attacks in the automotive network communications protocol FlexRay. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds.) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. ASC, vol. 53. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-540-88181-0_11
Palanca, A., Evenchick, E., Maggi, F., Zanero, S.: A stealth, selective, link-layer denial-of-service attack against automotive networks. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 185–206. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60876-1_9
Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Workshop on Embedded Security in Cars (2004)
Acknowledgements
This work was supported by a grant of the Romanian Ministry of Research and Innovation, CNCS - UEFISCDI, project number PN-III-P1-1.1-PD-2016-1198, within PNCDI III.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Murvay, PS., Groza, B. (2019). Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. In: Zemmari, A., Mosbah, M., Cuppens-Boulahia, N., Cuppens, F. (eds) Risks and Security of Internet and Systems. CRiSIS 2018. Lecture Notes in Computer Science(), vol 11391. Springer, Cham. https://doi.org/10.1007/978-3-030-12143-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-12143-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12142-6
Online ISBN: 978-3-030-12143-3
eBook Packages: Computer ScienceComputer Science (R0)