论文标题
对安全漏洞的DOIP协议的分析
Analysis of the DoIP Protocol for Security Vulnerabilities
论文作者
论文摘要
在ISO 13400中定义的DOIP是用于诊断数据的传输协议堆栈。诊断数据是车辆的潜在攻击向量,因此必须保证安全传输以保护敏感的数据和车辆。先前的工作分析了没有传输层安全性(TLS)的DOIP协议的草稿版本和早期版本。对于DOIP协议没有正式分析。这项工作的目的是调查可能导致安全漏洞和可能利用它们的攻击的设计缺陷的DOIP协议。为此,我们在第一步中演绎分析了DOIP协议,然后随后正式确认我们的结论。为了进行正式分析,我们使用tamarin。根据结果,我们提出了对策以改善工作中心的安全性。我们不能将DOIP协议视为安全,主要是因为DOIP协议中的安全机制和客户端身份验证不是强制性的。我们提出的措施减轻了我们确认在激活TLS之后保留的漏洞。这些仅需要对协议的次要重新设计。
DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work analyzed a draft version and earlier versions of the DoIP protocol without Transport Layer Security (TLS). No formal analysis exists for the DoIP protocol. The goal of this work is to investigate the DoIP protocol for design flaws that may lead to security vulnerabilities and possible attacks to exploit them. For this purpose, we deductively analyze the DoIP protocol in a first step and subsequently confirm our conclusions formally. For the formal analysis, we use the prover Tamarin. Based on the results, we propose countermeasures to improve the DoIP's security.We showthat the DoIP protocol cannot be considered secure mainly because the security mechanisms TLS and client authentication in the DoIP protocol are not mandatory. We propose measures to mitigate the vulnerabilities thatwe confirm to remain after activating TLS. These require only a minor redesign of the protocol.