Comprehensive Automotive Security: From Classic Vehicle Networks to Advanced Ethernet Protocols

This two-day training is designed to provide a holistic view of automotive security, combining traditional in-vehicle network fundamentals with modern Ethernet-based protocols and testing. Attendees will first explore low-level automotive communication and hardware reverse engineering, then dive into Ethernet-specific stacks and security mechanisms like Diagnostics over IP (DoIP), VLAN configuration, TLS encryption, and SOME/IP.

Day 1: Classic Automotive Security

  1. Vehicle Network Fundamentals
    • Introduction to CAN, ISO-TP, and UDS
    • Understanding typical in-vehicle architectures and communication flows
  2. Hardware Reverse Engineering
    • Exploring ECU internals: board layout, component identification, and data extraction
    • Debug interfaces (e.g., JTAG, SWD) and safe handling practices
  3. Hands-on Diagnostics and Attacks
    • Sending and interpreting UDS requests/responses
    • Identifying vulnerabilities in traditional ECUs
    • Practical exercises using open-source tools (e.g., Scapy, Python scripts)

Day 2: Ethernet-Based Automotive Networks

  1. Ethernet Basics in Automotive
    • Differences between 100/1000BASE-T and 100/1000BASE-T1
    • VLAN setup, segmentation, and troubleshooting
  2. Diagnostics over IP (DoIP)
    • Message flow and session management
    • Analyzing DoIP traffic and potential security pitfalls
  3. TLS and Secure Communications
    • Certificate handling and encryption best practices
    • Testing TLS configurations using testssl.sh and related tools
    • Fuzzing and stress-testing with Frankencert
  4. Advanced Protocols and Implementations
    • Introduction to Some/IP, AUTOSAR PDUs, and proprietary automotive protocols
    • Capturing and injecting Ethernet frames with Scapy for protocol manipulation
    • Combining DoIP, TLS, and VLAN concepts for end-to-end security
  5. Practical Labs and Troubleshooting
    • Network scanning, sniffing, and injection with Wireshark, tcpdump, and Scapy
    • Realistic attack simulation on an Ethernet-based ECU setup
    • Best practices and mitigation strategies

About the Speakers