《2022特斯拉安全漏洞.docx》由会员分享,可在线阅读,更多相关《2022特斯拉安全漏洞.docx(71页珍藏版)》请在优知文库上搜索。
1、特斯拉安全漏洞Tencent开究背景工安全彳KEENsecuritylab车联网安全研究背景Tencent智能网联汽车将成为汽车行业的核心重点“网联”汽车:具有互联网接入功能的汽车,具备车载系统和车云之间的数据同步功能,以及面向用户的互联网访问服务功能。大规模上市期:2017-2020“智能”汽车:具有自动驾驶或者无人驾驶功能的汽车,完全改变坐乘人员的体验,车内用户场景发生剧烈改变。大规模上市期:2020-2025行业领军品牌沃尔沃:“智能”汽车领域行业标杆,已经在2016年实现自动驾驶,并计划在2020年实现量产全无人驾驶车。特斯拉:“网联”汽车领域的行业标杆,并已经在2016年在量产车上实
2、现辅助驾驶功能。帝一大量新技术和网联功能引入,带来信息安全机遇环境感知层激光雷达、毫米波雷达、摄像头、传感器、红外测距、卫星导航、路侧系统等,信息融合层行人隙碍物识别、车辆识别、场景重构、精准定位等数据采集层智能决策层路径规划、人机共驾等控制执行层自动驾驶、无人驾驶、轨迹跟踪、转向制动、耦合动力学全状态参数识别等安全体系功能安全(FUnCtiOnaISafety)和信息安全(CyberSeCUrity)智能控制系统架构通讯架构和控制架构整车集成与标定整车硬件集成(底盘、车身、电机、电池系统等)和智能控制系统集成测试模块性能测试(测试机理)和整车功能测试(测试方法)摘自:上海市政府汽车行业规划发
3、展内部报告车联网安全市场前景2017NoteOuetorounng.rw11tmh11heremayMaMUPlSourceP*CSlrMegyAnfnExhibit7Connectedcarrevenuepotential,byregion,2017-22WesternE.U.UnitedStatesJapanS12.4(2i,WhilethosetypesofvehiclesareonlybecomingmoreprominentReuterssharesdatafrommarketresearcherIDATEshowingthatthenumberofconnectedcarsonth
4、eroadhasrisen57percentannuallysince2013andthatthetotalnumberisexpectedtoreach420millionby2018keepingthemsafefromhackersisbecomingabigbusiness.,Weviewthisasapotential$10billionmarketopportunityoverthenextfiveyears,ReutersquotesDanielIves,ananalystwithFBRCapitalMarketsinNeWYork,asstating.”“TheReuterss
5、toryaddsthatHannanInternationalIndustries,amakerofconnectedcarsystems,boughtIsraeli-foundedcyberdefensestartupTowerSecforthepurposeofprotectingitsproductsandthatglobaltechcompanies,likeIBMandCISCO,arealsoemployingtheirteamsinIsraeltoworkonthesecurityofconnectedcars.,-2016/1/12国际和国内安全行业:网联汽车安全研究成为新热,
6、kncem2015年7月,黑客可以通过远程方式入侵克莱斯勒自由光JEEP并对行车和车身进行远程控制,其中涉及了多个TSP模块、互联网通讯模块、车机模块中多个安全漏洞。影响:克莱斯勒召回北美地区140万辆自由光2015年7月,黑客实现对美国通用OnStar移动APP的劫持,可以远程控制车门开关、发动机启动和鸣号。主要涉及移动APP模块和TSP模块的安全漏洞。影响:通用紧急修复相关漏洞2016年2月,黑客实现对尼桑EV1.EAF移动APP的劫持,可以远程控制空调开关,闪灯等。主要涉及移动APP模块和TSP模块的安全漏洞。影响:尼桑临时关闭1.EAF云端服务:、汽车安全基础与工具K)KEENsecu
7、ritylabCarHackersHandbookhttp:/opengarages.org/handbook/ExposingtheVulnerabilitiesandRisksofHighTechVehicles http:/icitech.org/wp-content/uploads/2015/09/ICIT-Brief_Whos-Behind-the-Wheel_Car-Hacking2.pdfASurveyofRemoteAutomotiveAttackSurfaces AdventuresinAutomotiveNetworksandControlUnitsTencentI试工具1
8、.20.0/24-p80):/nmap.org)at2016-06-1107:OlPDTJ3.20.0J3.20.10.J3.20.33204J3.20.50-IOKEENsecuritylab汽车安全双 Nmap Wireshark CANalyzer BinwalkIDA$sudonnap-Pn-sS10.32StartingNmap6.40(htNmapscanreportforIO.二Hostisup.PORTSTATESERVICE80/tcpfilteredhttpNmapscanreportfor10.2Hostisup(0.84slatencyPORTSTATESERVICE8
9、0/tcpclosedhttpNmapscanreportfor10.2Hostisup.PORTSTATESERVICE80/tcpfilteredhttpNmapscanreportfor10.3Hostisup.PORTSTATESERVICE80/tcpfilteredhttpNmapscanreportfor10.2Hostisup(0.84slatencyPORTSTATESERVICE80/tcpclosedhttpNmapscanreportfor10.3Hostisup(0.84slatencyPORTSTATESERVICE80/tcpclosedhttp Nmap Wir
10、eshark CANalyzer BinwalkIDA420100.pcapnq文件(F)编痛视图(V)/桀(G)际(C)分析(八)统计(三)电话(Y)无线(W)ZS(T)帮助(三)鼻|应用显示过滤器立”i-/於0QT够震布现国圜40A至NoSource1192.168.90.1002192.168.90.1003192.168.90.1024192.168.90.1025192.168.90.1026192.168.90.1027192.168.90.1028192.168.90.1009192.168.90.10210192.168.90.10211192.168.9.10212192.1
11、68.90.10213192.168.90.10014192.168.90.10215192.168.90.10216192.168.9.102Destination224.0.0.26224.0.0.26192.168.90.255192.168.90.255192.168.90.255192.168.90.255192.168.90.255224.0.0.26192.168.90.255192.168.9.255192.168.90.255192.168.90.255224.0.0.26192.168.90.255192.168.90.255192.168.90.255Protocol1.
12、engthJD,UDPJ2PJAUDPPpppUDUOUDUDJzpUDPInfo450407414031160407414031622l2ll622l00-201016220100-201016220100-201016220100-201016234020-49996220100210162201002010162201002ll622l0-201018840741-40316220100-201016220100201016220100-201011.en=4061.en=1161.en=121.en三121.en-121.en-121.en三121.en=41.en=121.en=12
13、1.en=121.en-121.en-441.en三121.en三8q3表达式+InternetProtocolVersion4,Src:192,168.90.102,Dst:192.168.90.255UserDatagramProtocol,SrcPort:20100(20100),DstPort:20101(20101)Data(12bytes)Data:0000008313lcl090000000 Nmap Wireshark CANalyst BinwalkIDA3SEND17:54:36.7710x0000064cDATAFrame0x080227Oil00000000004RECV17:54:36.7810x0000065cDATAFrame0x08101267Ol00QlQ2035SEND17:54:36.9810x0000064cDATAFrame0x0830000000000000006RECV17:54:36.9810x0000065cDATAFrame0x0821040506070809Oa7RECV17:54:36.9810x0000065c