Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3465748
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods

Abstract: Automotive Ethernet is increasingly used in modern vehicles and complements or replaces legacy bus systems such as CAN. Ethernet also enables service-oriented communication with the Scalable service-Oriented MiddlewarE over IP (SOME/IP) middleware. In this paper, we present a formal and practical security analysis of SOME/IP, the identified Man-in-the-Middle (MITM) attacks, and propose two security extensions. The attacks are possible even if SOME/IP is used in combination with link layer security mechanisms. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…The analysis shows that in the process of communication transmission, the state space of the reinforcement scheme is significantly reduced, the security performance is also significantly improved, and the calculation time is also greatly reduced. Reference [31] uses Tamarin to analyze the SOME/IP protocol formally. The analysis results show that the protocol has three different types of man-in-the-middle attack vulnerabilities.…”
Section: Improvement Scheme Performance Analysis and Methods Comparisonmentioning
confidence: 99%
“…The analysis shows that in the process of communication transmission, the state space of the reinforcement scheme is significantly reduced, the security performance is also significantly improved, and the calculation time is also greatly reduced. Reference [31] uses Tamarin to analyze the SOME/IP protocol formally. The analysis results show that the protocol has three different types of man-in-the-middle attack vulnerabilities.…”
Section: Improvement Scheme Performance Analysis and Methods Comparisonmentioning
confidence: 99%
“…The advantage of flexible communication of SOME/IP, though, can be a security vulnerability. As a result, researchers have revealed several feasible MITM attacks related to SOME/IP communication [ 12 , 13 ]. Since the importance of protecting vehicle control and messages is very high, a secure SOME/IP communication method that is both robust against possible attacks while maintaining the advantages of the SOME/IP-SD protocol is required.…”
Section: Some/ipmentioning
confidence: 99%
“…A detailed description of representative MITM attacks is explained in the blog [ 12 ] written by Shir Mousseri from ARGUS cyber security. Zelle et al [ 13 ] present various MITM attack scenarios that can occur in SOME/IP, as well as the feasibility of the attacks in detail. Since actual vehicle control messages can create hazardous situations when attacked, a method that mitigates MITM attacks and does not affect the vehicle’s requirements is needed.…”
Section: Some/ipmentioning
confidence: 99%
See 2 more Smart Citations