Comprehensive Automotive Security: From Classic Vehicle Networks to Advanced Ethernet Protocols
This two-day training is designed to provide a holistic view of automotive security, combining traditional in-vehicle network fundamentals with modern Ethernet-based protocols and testing. Attendees will first explore low-level automotive communication and hardware reverse engineering, then dive into Ethernet-specific stacks and security mechanisms like Diagnostics over IP (DoIP), VLAN configuration, TLS encryption, and SOME/IP.
Day 1: Classic Automotive Security
- Vehicle Network Fundamentals
- Introduction to CAN, ISO-TP, and UDS
- Understanding typical in-vehicle architectures and communication flows
- Hardware Reverse Engineering
- Exploring ECU internals: board layout, component identification, and data extraction
- Debug interfaces (e.g., JTAG, SWD) and safe handling practices
- Hands-on Diagnostics and Attacks
- Sending and interpreting UDS requests/responses
- Identifying vulnerabilities in traditional ECUs
- Practical exercises using open-source tools (e.g., Scapy, Python scripts)
Day 2: Ethernet-Based Automotive Networks
- Ethernet Basics in Automotive
- Differences between 100/1000BASE-T and 100/1000BASE-T1
- VLAN setup, segmentation, and troubleshooting
- Diagnostics over IP (DoIP)
- Message flow and session management
- Analyzing DoIP traffic and potential security pitfalls
- TLS and Secure Communications
- Certificate handling and encryption best practices
- Testing TLS configurations using
testssl.sh
and related tools - Fuzzing and stress-testing with Frankencert
- Advanced Protocols and Implementations
- Introduction to Some/IP, AUTOSAR PDUs, and proprietary automotive protocols
- Capturing and injecting Ethernet frames with Scapy for protocol manipulation
- Combining DoIP, TLS, and VLAN concepts for end-to-end security
- Practical Labs and Troubleshooting
- Network scanning, sniffing, and injection with Wireshark, tcpdump, and Scapy
- Realistic attack simulation on an Ethernet-based ECU setup
- Best practices and mitigation strategies