izpis_h1_title_alt

PRILAGODITEV METODOLOGIJE PENETRACIJSKEGA TESTIRANJA POVEZANIH VOZIL
ID KOSEM, MATJAŽ (Author), ID Humar, Iztok (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (3,85 MB)
MD5: 9A6D969684FD840EFDB846C3097CFFCF
PID: 20.500.12556/rul/7fe17806-e284-463a-ac7c-7003912edfb9

Abstract
Moderna vozila so močno avtomatizirana in povezana z okolico, kar s seboj prinaša večjo nevarnost za oddaljene zlorabe. Namen magistrskega dela je napraviti pregled groženj informacijske varnosti v povezanih vozilih ter cilj predlagati prilagojeno metodologijo penetracijskega testiranja za povezana vozila. V uvodu najprej razložimo, na kakšen način penetracijsko testiranje v povezanih vozilih pripomore k izboljšanju informacijske varnosti ter zakaj je priporočljivo pri tem uporabiti prilagojeno metodologijo. V jedru dela nato razdelamo informacijske lastnosti povezanega vozila, ki je združba dveh informacijskih svetov. Na zunaj komunicira z upravljalno infrastrukturo, drugimi vozili in potniki s pomočjo splošno uporabljenih protokolov, kot so Wi-Fi, GSM in Bluetooth, znotraj pa komunikacija namenskih elektronskih naprav ECU teče po CAN-protokolu, ki je specifičen in zaradi zgodovine izredno ranljiv. Za tem v magisteriju potegnemo vzporednice lastnosti informacijske varnosti s povezanim vozilom, opirajoč se na CIA-triado, ki predstavlja temeljne principe informacijske varnosti. Nato opišemo še lastnosti penetracijskega testiranja ter pregledamo obstoječe metodologije z namenom ugotoviti, katere lastnosti je mogoče uporabiti pri povezanih vozilih in katerih ne. Dotaknemo se še izdelave modela groženj, ki pripomore, da je test dosleden, učinkovit in ponovljiv. V zadnjem delu končno predlagamo specializirano metodologijo, ki se od klasičnih razlikuje predvsem v delu po inicialnem napadu – notranje CAN-omrežje se pregleduje ločeno prek servisnih vrat OBD-II, ker ima to možnost tudi potencialni napadalec, razlika pa je tudi v načinu lateralnega premika, ki pri klasičnem pregledu pomeni razbijanje in lovljenje gesel, pri povezanem vozilu pa vzpostavitev komunikacijskega premika iz Etherneta v CAN-svet. V prihodnosti eno izmed največjih groženj predstavlja vstop mobilnih aplikacij v sistem ”infotainment”, kar nujnost izvajanja standardiziranega penetracijskega testiranja povezanih vozil postavlja na prvo mesto.

Language:Slovenian
Keywords:povezano vozilo, informacijska varnost, površje napada, metodologija penetracijskega testiranja
Work type:Master's thesis
Organization:FE - Faculty of Electrical Engineering
Year:2016
PID:20.500.12556/RUL-84950 This link opens in a new window
Publication date in RUL:08.09.2016
Views:1592
Downloads:348
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:ELABORATION OF PEN-TEST METHODOLOGY FOR CONNECTED CARS
Abstract:
Modern vehicles are highly automated and connected, which results in grater risk for remote abuse. The purpose of this thesis is to outline the information security threats in connected cars, and suggest penetration testing methodology tailored to connected cars. Introduction explains how penetration testing of connected cars helps and improves its information security, and why it is advisable to use customized methodology. It is followed by an overview of connected car's information technology properties, that are combining two informational worlds. On the outside, the connected car communicates with the managed infrastructure, other cars and passengers through generally used protocols, such as Wi-Fi, GSM and Bluetooth. On the inside, dedicated ECU devices communicate using CAN protocol, which is specific and due to its history highly vulnerable. Then, comparison of information security properties in connected cars is made based on CIA triad, the core principles of information security. Further on, existing penetration testing methodologies are described with the intention to deduct which properties are usable with connected cars. Making threat models ensures that testing is consistent, efficient and repeatable. Finally, a specialized methodology is suggested. It differs from classical methodologies in the initial attack – the inside CAN network is examined separately through the OBD-II service port, since that option is available to the potential hacker as well. Suggested specialized methodology differs also in the lateral move, that in classical methodologies means cracking and catching passwords, and in connected car it has to do with shifting communication from Ethernet into the CAN protocol. One of the major upcoming threats is introduced with mobile applications entering the infotainment system, which makes standardized penetration testing of connected cars a must.

Keywords:connected car, information security, attack surface, penetration testing methodology

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back