分享

AutoSAR Typical Threat Analysis and SM

 花信风zq 2021-04-18

Thanks [Samuel WENG]

Cybersecurity, RAMS investigator

一: AutoSAR典型架构

只有如下图示中的部分架构内容会被分析

图片

此处部分,总共26个威胁会被列举。

Threat(s) Not Associated With an Interaction:

1. Nonstandard threat to describe user specific conditions  

[State: Not Started]  [Priority: High] 

Category:

User-defined

Description:


Justification:

<no mitigation provided>

2. Nonstandard threat to describe user specific conditions  

[State: Not Started]  [Priority: High] 

Category:

User-defined

Description:


Justification:

<no mitigation provided>

Interaction: Call

图片

3. Spoofing of Source Data Store Application  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

Application may be spoofed by an attacker and this may lead to incorrect data delivered to CAL. Consider using a standard authentication mechanism to identify the source data store.

Justification:

<no mitigation provided>

4. Potential Data Repudiation by CAL  

[State: Not Started]  [Priority: High] 

Category:

Repudiation

Description:

CAL claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.

Justification:

<no mitigation provided>

5. Weak Access Control for a Resource  

[State: Not Started]  [Priority: High] 

Category:

Information Disclosure

Description:

Improper data protection of Application can allow an attacker to read information not intended for disclosure. Review authorization settings.

Justification:

<no mitigation provided>

6. Potential Process Crash or Stop for CAL  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

CAL crashes, halts, stops or runs slowly; in all cases violating an availability metric.

Justification:

<no mitigation provided>

7. Data Flow Call Is Potentially Interrupted  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent interrupts data flowing across a trust boundary in either direction.

Justification:

<no mitigation provided>

8. Data Store Inaccessible  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent prevents access to a data store on the other side of the trust boundary.

Justification:

<no mitigation provided>

9. CAL May be Subject to Elevation of Privilege Using Remote Code Execution  

[State: Not Started]  [Priority: High] 

Category:

Elevation Of Privilege

Description:

Application may be able to remotely execute code for CAL.

Justification:

<no mitigation provided>

10. Elevation by Changing the Execution Flow in CAL  

[State: Not Started]  [Priority: High] 

Category:

Elevation Of Privilege

Description:

An attacker may pass data into CAL in order to change the flow of program execution within CAL to the attacker's choosing.

Justification:

<no mitigation provided>

Interaction: Communication

图片

11. Spoofing of Source Data Store CSM  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

CSM may be spoofed by an attacker and this may lead to incorrect data delivered to SHE Driver. Consider using a standard authentication mechanism to identify the source data store.

Justification:

<no mitigation provided>

12. Spoofing of Destination Data Store SHE Driver  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

SHE Driver may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SHE Driver. Consider using a standard authentication mechanism to identify the destination data store.

Justification:

<no mitigation provided>

13. Data Store Denies SHE Driver Potentially Writing Data  

[State: Not Started]  [Priority: High] 

Category:

Repudiation

Description:

SHE Driver claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.

Justification:

<no mitigation provided>

14. Data Flow Communication Is Potentially Interrupted  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent interrupts data flowing across a trust boundary in either direction.

Justification:

<no mitigation provided>

15. Data Store Inaccessible  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent prevents access to a data store on the other side of the trust boundary.

Justification:

<no mitigation provided>

Interaction: Interlink

图片

16. Data Store Inaccessible  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent prevents access to a data store on the other side of the trust boundary.

Justification:

<no mitigation provided>

17. Data Flow Interlink Is Potentially Interrupted  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent interrupts data flowing across a trust boundary in either direction.

Justification:

<no mitigation provided>

18. Data Store Denies Application Potentially Writing Data  

[State: Not Started]  [Priority: High] 

Category:

Repudiation

Description:

Application claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.

Justification:

<no mitigation provided>

19. Spoofing of Destination Data Store Application  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

Application may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of Application. Consider using a standard authentication mechanism to identify the destination data store.

Justification:

<no mitigation provided>

20. Spoofing of Source Data Store CSM  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

CSM may be spoofed by an attacker and this may lead to incorrect data delivered to Application. Consider using a standard authentication mechanism to identify the source data store.

Justification:

<no mitigation provided>

21. Nonstandard threat to describe user specific conditions  

[State: Not Started]  [Priority: High] 

Category:

User-defined

Description:


Justification:

<no mitigation provided>

Interaction: Triggering signal

图片

22. Spoofing of Source Data Store SHE Driver  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

SHE Driver may be spoofed by an attacker and this may lead to incorrect data delivered to SHE. Consider using a standard authentication mechanism to identify the source data store.

Justification:

<no mitigation provided>

23. Spoofing of Destination Data Store SHE  

[State: Not Started]  [Priority: High] 

Category:

Spoofing

Description:

SHE may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SHE. Consider using a standard authentication mechanism to identify the destination data store.

Justification:

<no mitigation provided>

24. Data Store Denies SHE Potentially Writing Data  

[State: Not Started]  [Priority: High] 

Category:

Repudiation

Description:

SHE claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.

Justification:

<no mitigation provided>

25. Data Flow Triggering signal Is Potentially Interrupted  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent interrupts data flowing across a trust boundary in either direction.

Justification:

<no mitigation provided>

26. Data Store Inaccessible  

[State: Not Started]  [Priority: High] 

Category:

Denial Of Service

Description:

An external agent prevents access to a data store on the other side of the trust boundary.

Justification:

<no mitigation provided>

二: 威胁对应的安全需求列举

Threat ID

Context

Cybersecurity requirement

001

Nonstandard threat to describe user specific condition

Asset:

tbd

Damage Scenario:

tbd

Description:

tbd

Justification:

tbd

002

Nonstandard threat to describe user specific conditions

tbd

003

Spoofing of Source Data Store Application

Asset:

call from application to CAL

Damage scenario:

Wrong calling or wrong execution from application

Justification:

using a standard authentication mechanism to identify the source data store.

Real Practise:

CAL Basic cryptography can be in support, Hash plus MAC can be in effect

004

Potential Data Repudiation by CAL

Asset:

Received data from application to CAL

Damage scenario:

CAL claims that it did not receive data from a source outside the trust boundary.

Justification:

Consider using logging or auditing to record the source, time, and summary of the received data.

Using SymEncryptService or timer add up in the message for counter/

005

Weak Access Control for a Resourc

Asset:

Application data

Damage scenario:

Improper data protection of Application can allow an attacker to read information not intended for disclosure.

Justification:

Review authorization settings.

Best practise:

Access right whitelist application

006

Potential Process Crash or Stop for CAL

Asset:

CAL availability

Damage scenario:

CAL crashes, halts, stops or runs slowly;

Justification:

AutoSAR shall send out diagnosis trouble code and reset, record abnormal behavior logs if CAL suffer from damage scenarios

007

Data Flow Call Is Potentially Interrupted

Asset:

Accessibility of data stored in the trust boundary around CAL

Damage scenario:

Unavailability of access to data near CAL

008

Data Store Inaccessible

Asset:

Accessibility of data stored in the trust boundary around CAL

Damage scenario:

Unavailability of access to data near CA

Justification:

Authorization mechanism based on assymmetric cryptography

009

CAL May be Subject to Elevation of Privilege Using Remote Code Execution

Asset:

Code in CAL

Damage scenario:

Unauthorization right access to CAL data

Justification:

Visit access right authentication mechanism urgently needed

010

Elevation by Changing the Execution Flow in CA

Asset:

Code in CAL

Damage scenario:

Unauthorization right access to CAL data

Justification:

Visit access right authentication mechanism urgently neede

011

Spoofing of Source Data Store CSM

Asset:

Data storing in CSM

Damage Scenario:

Erroneous data sent to SHE driver from CSM

Justification:

Secoc will be used to authenticate messages, or key + MAC will be used ensuring communication

012

Spoofing of Destination Data Store SHE Drive

Not Applicable

013

Data Store Denies SHE Driver Potentially Writing Data

Not Applicable

014

Data Flow Communication Is Potentially Interrupted

Not Applicable

015

Data Store Inaccessible

Not Applicable

016

Data Store Inaccessible

Asset:

data store in CSM

Damage scenario:

Service halt, application cannot access CSM

Justification:

Sending diagnostic trouble code and reset 

017

Data Flow Interlink Is Potentially Interrupted

Asset:

Data in interlink

Damage scenario:

Erroneous links or messages between application and CSM

Justification:

Key and MAC can be used to authenticate the message

018

 Data Store Denies Application Potentially Writing Data

Asset:

data in application

Damage scenario:

Application denies writing data

Justification:

Consider using logging or auditing to record the source, time, and summary of the received data.

019

Spoofing of Destination Data Store Application

Asset:

data writing to destination application modules

Damage scenario:

Undesired destination for data writing

Justification:

Standard authentication mechanisms to identify the writing destination, based on storing ID

020

Spoofing of Source Data Store CSM

Asset:

CSM

Damage scenario:

Erroneous CSM data to application

Justification:

Consider using a standard authentication mechanism to identify the source data store.

MAC and symmetric key used

021

Nonstandard threat to describe user specific conditions

tbd

022

Spoofing of Source Data Store SHE Driver

SHE driver no such threat

023

Spoofing of Destination Data Store SHE

SHE using the authentication mechanism enough for this threat

024

Data Store Denies SHE Potentially Writing Data

Asset:

SHE

damage scenario:

SHE claims that it did not write data received from an entity on the other side of the trust boundary

Justification:

Consider using logging or auditing to record the source, time, and summary of the received data.

025

Data Flow Triggering signal Is Potentially Interrupted

Asset:

triggering signals

Damage scenario:

An external agent interrupts data flowing across a trust boundary in either direction.

Justification:

logging, DTC sent out, and then reset or stop the operating for checking

026

Data Store Inaccessible

Asset:

SHE data

Damage:

An external agent prevents access to a data store on the other side of the trust boundary in SHE

SHE:

HSM or SHE needed




Thanks for your reading!

    本站是提供个人知识管理的网络存储空间,所有内容均由用户发布,不代表本站观点。请注意甄别内容中的联系方式、诱导购买等信息,谨防诈骗。如发现有害或侵权内容,请点击一键举报。
    转藏 分享 献花(0

    0条评论

    发表

    请遵守用户 评论公约

    类似文章 更多