Wheels of Wonder

By Hrishikesh Somchatwar on 21 Nov 2024 @ Securityfest
πŸ“Ή Video πŸ”— Link
#automotive-cybersecurity #car-hacking #embedded-systems #network-architecture #firmware-analysis #secure-development #security-testing
Focus Areas: πŸ”§ Hardware Security , πŸ” Application Security , βš™οΈ DevSecOps , 🏭 Industrial Control Systems Security , πŸ“‘ IoT Security , 🌐 Network Security , πŸ”¬ Reverse Engineering , πŸ—οΈ Security Architecture

Presentation Material

Abstract

This research delves into the dynamic convergence of telecom and hardware hacking, focusing on vehicular networks and innovative tools. The study reveals vulnerabilities in modern vehicular networks, uncovering covert techniques in telecom hacking and the manipulation of connected vehicles. Through meticulous examination and advanced tools, the research dissects cryptic methodologies such as GPS Spoofing within the realms of telecom, hardware hacking, and illicit stations. The findings stress the immediate need for innovative countermeasures in contemporary security protocols, inviting telecom enthusiasts and hardware hackers to explore the intricate landscape of vehicular cybersecurity.

Presented at Security Fest 2024.

AI Generated Summary

This talk focused on the security vulnerabilities of the telematics control unit (TCU), a central component in modern vehicles that manages communication between various electronic control units and external networks. The research argued that TCUs are frequently overlooked in automotive security assessments despite their critical role as a networked gateway.

The presentation detailed a multi-vector attack methodology against a production TCU. First, a telecom-based attack was demonstrated using a software-defined radio (USRP B210) and OpenBTS to create a fake base station. This allowed the TCU to be tricked into connecting to the attacker’s network, enabling man-in-the-middle attacks to intercept over-the-air firmware updates and capture sensitive identifiers like IMEI. Second, physical hardware analysis was performed. X-ray imaging revealed the absence of tamper detection mechanisms, permitting device decapsulation. Debugging interfaces (UART, SPI) were identified using a JTAGulator, and a custom baud rate was brute-forced to extract serial data. Third, GPS spoofing was achieved using a HackRF to simulate satellite signals, successfully manipulating the TCU’s reported location.

The practical implications are significant. Compromising a TCU can lead to the theft of location data, interception of cellular communications, and potential manipulation of vehicle functions relayed through the TCU. The research concludes that the TCU represents a high-severity, often neglected attack surface in connected vehicles. Manufacturers must implement robust security for this component, including secure boot, encrypted communications, and tamper-evident hardware, as its compromise could undermine the security of the entire vehicle system.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.