Objective & context
For security based attacks Flexray is a challenging automotive bus system. Specific knowledge, timing, and experience is necessary to set up a proper environment available to attack. Therefore, almost no published attacks or test equipment for Flexray is available. The OEM requested penetration testing of an electrical power steering: manipulate messages, manipulate checksums, attack the diagnostics and coding.
Realizations
- Set up a Flexray pentesting environment (device under attack, restbus-simulation)
- Design a custom device to perform man-in-the-middle attacks
- Block and manipulate messages
- Destroy checksum calculations and monitor the system behavior
- Replay prerecord frames
- Replay prerecord access to diagnostic and coding sessions
- Reverse-Engineer coding protocol to prove the absence of security measures
- Report the findings
Added value & customer benefits
- Skills on both security & automotive matters
- Setup of own customized test equipment