
Research Article
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles
@INPROCEEDINGS{10.1007/978-3-031-51630-6_2, author={Josh Dafoe and Harsh Singh and Niusen Chen and Bo Chen}, title={Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles}, proceedings={Security and Privacy in Cyber-Physical Systems and Smart Vehicles. First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings}, proceedings_a={SMARTSP}, year={2024}, month={2}, keywords={Connected and autonomous vehicles ECU CAN bus flash translation layer TrustZone Steganography}, doi={10.1007/978-3-031-51630-6_2} }
- Josh Dafoe
Harsh Singh
Niusen Chen
Bo Chen
Year: 2024
Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles
SMARTSP
Springer
DOI: 10.1007/978-3-031-51630-6_2
Abstract
With increasing development of connected and autonomous vehicles, the risk of cyber threats on them is also increasing. Compared to traditional computer systems, a CAV attack is more critical, as it does not only threaten confidential data or system access, but may endanger the lives of drivers and passengers. To control a vehicle, the attacker may inject malicious control messages into the vehicle’s controller area network. To make this attack persistent, the most reliable method is to inject malicious code into an electronic control unit’s firmware. This allows the attacker to inject CAN messages and exhibit significant control over the vehicle, posing a safety threat to anyone in proximity.
In this work, we have designed a defensive framework which allows restoring compromised ECU firmware in real time. Our framework combines existing intrusion detection methods with a firmware recovery mechanism using trusted hardware components equipped in ECUs. Especially, the firmware restoration utilizes the existing FTL in the flash storage device. This process is highly efficient by minimizing the necessary restored information. Further, the recovery is managed via a trusted application running in TrustZone secure world. Both the FTL and TrustZone are secure when the ECU firmware is compromised. Steganography is used to hide communications during recovery. We have implemented and evaluated our prototype implementation in a testbed simulating the real-world in-vehicle scenario.