Skip to main navigation Skip to search Skip to main content

A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

We present our experience of formally verifying the desired security properties of the Uptane over-the-air (OTA) software update framework against a set of applicable threat models. Uptane is gaining traction in the automobile industry and is widely considered the next de-facto standard for OTA automobile software updates. The security of Uptane is of utmost importance because modern automobiles rely on software for their safety-critical functionalities and, especially, require OTA software updates to add new safety features or patch bugs in existing ones. Design flaws in Uptane can either violate the integrity of the updates to be installed or prevent vehicles from installing new updates, both of which can cause severe safety issues. Previous approaches to protocol verification either fail to capture the necessary features of Uptane or suffer from termination issues due to Uptane’s complexity. A key component of our approach lies in the eager combination of an infinite-state model checker and a cryptographic protocol verifier, where (in contrast to prior lazy approaches) we are able to eliminate a key manual step in the workflow while enabling reasoning over more fine-grained message structures. In addition, our approach utilizes two proven soundness- and completeness-preserving state-space-reduction optimizations for computational tractability, as well as a meta-level analysis technique that makes it feasible to reason over Uptane’s set of optional protocol features. Our approach is able to discover six new vulnerabilities while rediscovering all five known ones. While there have been previous analyses of Uptane’s security properties, they either missed design flaws identified by our approach or suffered from coverage and termination issues. The Uptane standards body has positively acknowledged our findings and has suggested updates to the protocol specification documents to address them.

Original languageEnglish
Title of host publicationProceedings of 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024
PublisherAssociation for Computing Machinery
Pages594-612
Number of pages19
ISBN (Electronic)9798400709593
DOIs
StatePublished - Sep 30 2024
Event27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024 - Padua, Italy
Duration: Sep 30 2024Oct 2 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024
Country/TerritoryItaly
CityPadua
Period09/30/2410/2/24

Keywords

  • attacks
  • automotive security
  • model checking
  • protocol analysis
  • vulnerabilities

Fingerprint

Dive into the research topics of 'A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework'. Together they form a unique fingerprint.

Cite this