In English

A Security Evaluation and Internal Penetration Testing Of the CAN-bus

Sareh Talebi
Göteborg : Chalmers tekniska högskola, 2015. 95 s.
[Examensarbete på avancerad nivå]

From the early ages of civilization, people have always fought to have safety and comfort in all the aspects of their lives. Contemporary vehicles are not an exception. Nowadays, vehicles contain a number of electronic control units (ECUs) which form networks and provide many different functions. In order to let the driver benefit from the new technology, the automotive manufacturers have created a strong relationship between the vehicle and the fleet management. Remote diagnosis and firmware updates over the air (FOTA) are some examples of services brought by the new technology in order to involve a minimum of customer inconvenience. This approach brings a considerable number of advantages: the vehicle needs no longer to be brought in a service station, the update of a firmware is made as soon as it is released, and the time between discovering an error and identifying its causes is reduced. But, in order to assure these functions, in-vehicle networks are connected to external networks, a fact that exposes them to dangerous threats such as cyber attacks.

The in-vehicle network consists of a number of networks where each of them has different impact on the vehicle’s mechanism. These networks are formed by a number of ECUs and are used differently. For instance, MOST (media oriented system transport) is used in to transmit voice, audio, and video content. LIN (local interconnected network) is responsible for controlling door locking mechanisms, windows and mirrors. For critical applications, such as engine control and anti-lock braking system (ABS), CAN (controller area network) is used.

This master thesis evaluates the security in in-vehicle networks by focusing on the CAN-bus protocol, since the most critical applications use this protocol for communications. In order to perform this evaluation, the development of a framework for conduction a penetration test is done.

Nyckelord: In-Vehicle networks, Connected Car, Controller Area Networks (CAN), Penetration Test



Publikationen registrerades 2015-02-12. Den ändrades senast 2015-02-12

CPL ID: 212488

Detta är en tjänst från Chalmers bibliotek