Preventing Unauthorized Network Access With Automotive Firewalls
Preventing Unauthorized Network Access With Automotive Firewalls
V0.1 | 2024-04-15
u Intro
Automotive Firewall
Summary
Introduction
Intro
Zonal E/E Architecture
u Zonal Architecture
u Definition of spatial vehicle zones (E.g., “Front Left”, “Rear”)
u ECUs as generic execution platforms for different functions (Lane assist, interior light, window lifter…)
> Hard Realtime: Gateways
> ADAS/Infotainment: High Performance Computers (HPC)
u Ethernet as backbone between zones (→ Saves wiring cost- and weight)
u Challenges
u Mixed traffic on Ethernet links between zones (Comfort, ADAS…)
u High communication load between zones
u Separation and flow control of different types of traffic needed
u Cybersecurity requirements on traffic
3
Intro
Security Gateway
u Security Gateways
u Are often a combination of a Smart Ethernet Switch implementing a
firewall and a Host Microcontroller
u Represent themselves as a single ECU on the network
u Are the central connecting nodes between zones
u Host Microcontroller
u Has an internal connection to the Ethernet switch
u Takes over some of the switch's tasks (update, diagnostics…)
u Executes other vehicle functions
4
Intro
Automotive Ethernet Traffic
u The network architecture and the traffic within a vehicle is well known
u Protocols
u Addresses
Ethernet PHY 1
5
Intro
Threats and Attack Paths
6
Agenda
Intro
u Automotive Firewall
Summary
7
Automotive Firewall
Types of Firewalls
8
Automotive Firewall
Hardware-Based Filtering
9
Automotive Firewall
Deep Packet Inspection (DPI)
u Deep Packet Inspection (DPI): Allows filtering on OSI layer 5 and higher
u DPI means parsing of the frame content
u DPI must be done by the switch CPU1 (→ TCAM are unsuitable for dynamic frame content)
u MICROSAR Firewall supports DPI for SoAd PDU IDs
> Filtering of Socket Adaptor (SoAd) IDs allows filtering of SOME/IP services
> Firewall parses layer 4 PDUs for contained layer 5 PDUs
> Beginning of next PDU is calculated by length in PCI
PduR PDU
10
Automotive Firewall
Security Gateway: Overview
u Work-split
u Switch:
> Firewalling
u Host:
> Intrusion detection (IDS) reporting
> Diagnostic communication to vehicle
> Software update
> …
1) The Host is required because of resource constraints of most switches Security Gateways without Host are not feasible
11
Automotive Firewall
Security Gateway: The Components
u IdsM (Master)
u Fordwards security events (SEv) raised by the
firewall to the IdsR or persists them in the SEM
12
Automotive Firewall
AFL Language: Overview
13
Automotive Firewall
AFL Language: Elements
u Ruleset
u An AFL-based firewall policy structure consists of at least one ruleset
u Chain
u A chain groups multiple rules together
u The rules in a chain are evaluated in sequential order (first to last)
u The first rule to match will dictate what action to take
u Rule
u A rule is an instruction to filter (drop) or allow (accept) the network
packet under inspection
u Filter
u A filter expression applies to a protocol field
u Filter expression can be atomic filter expression or so-called
compound filter expression, which combined multiple atomic filter
together by a logical operator
u Action
u The action is executed by the rule when all filter expressions are
fulfilled
u Actions can be
> Accept
> Drop
> Report
14
Automotive Firewall
AFB Tooling
u The Automotive Firewall Builder (AFB) tooling comprises of the following individual elements
u AFB ARXML: Allowlist firewall policy creation from AUTOSAR System Descriptions
> Analyzes the Ethernet communication in the AUTOSAR Classic Platform System Description
> Creates allowlist firewall rules in Automotive Firewall Language (AFL) for the switches in the vehicle network
15
Automotive Firewall
AFB Tooling
u The Automotive Firewall Builder (AFB) tooling comprises of the following individual elements
u AFB Compiler: Allowlist firewall policy creation
> Compiles the AFL Firewall rules into a hardware independent, data-oriented representation format (Filter Intermediate Representation (FIRE))
> Performs various optimization steps that eliminate redundant rules and combine similar rules
> Prioritize rules for hardware-based filtering based on traffic captures
u Rule Seperator / Generator: Software firewall- and hardware filter configuration generation
> Is the switch-hardware dependent part of the tooling
> Generates the filter instructions for the SW firewall
> Generates the configuration of the TCAM
> Deploys the rules to TCAM or the CPU depending on:
> The hardware features of the switch
> The filter conditions
> The filtered Ethernet protocol
> The prioritization done by the the AFB Compiler
16
Automotive Firewall
Unit Tests
u Unit Tests
u The AFB Tooling is used to define- and execute individual test
cases and test specifications
u A test case contains of
> One ore multiple input packets
> An expected result of the test
17
Automotive Firewall
Unit Tests
u Unit Tests
u The AFB Tooling is used to define- and execute individual test
cases and test specifications
u A test case contains of
> One ore multiple input packets
> An expected result of the test
u Code coverage
u Unit tests also perform coverage analysis that tells
> Which filter condition was hit/not hit
> Which rules have been hit/not hit
18
Automotive Firewall
Stakeholders and involved Tools
u The Automotive Firewall Toolchain supports the following stakeholders during the specification, development and
testing of automotive ethernet firewalls
19
Agenda
Intro
Automotive Firewall
u Summary
20
Summary
Option Firewall
21
For more information about Vector
and our products please visit
www.vector.com
Author:
Zeeb, Alexander
Vector Germany
22 © 2024. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V0.1 | 2024-04-15