Analysis of the DoIP Protocol for Security Vulnerabilities

11/22/2022
by   Patrick Wachter, et al.
0

DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work analyzed a draft version and earlier versions of the DoIP protocol without Transport Layer Security (TLS). No formal analysis exists for the DoIP protocol. The goal of this work is to investigate the DoIP protocol for design flaws that may lead to security vulnerabilities and possible attacks to exploit them. For this purpose, we deductively analyze the DoIP protocol in a first step and subsequently confirm our conclusions formally. For the formal analysis, we use the prover Tamarin. Based on the results, we propose countermeasures to improve the DoIP's security.We showthat the DoIP protocol cannot be considered secure mainly because the security mechanisms TLS and client authentication in the DoIP protocol are not mandatory. We propose measures to mitigate the vulnerabilities thatwe confirm to remain after activating TLS. These require only a minor redesign of the protocol.

READ FULL TEXT
research
03/15/2021

Formal Modelling and Security Analysis of Bitcoin's Payment Protocol

The Payment Protocol standard BIP70, specifying how payments in Bitcoin ...
research
06/06/2023

mdTLS: How to Make middlebox-aware TLS more efficient?

The more data transmission over TLS protocol becomes increasingly common...
research
07/13/2021

A QUIC(K) Way Through Your Firewall?

The QUIC protocol is a new approach to combine encryption and transport ...
research
07/30/2019

The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods

TLS 1.3 marks a significant departure from previous versions of the Tran...
research
09/16/2022

PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot

Hardware supply-chain attacks are raising significant security threats t...
research
07/20/2023

Formal-Guided Fuzz Testing: Targeting Security Assurance from Specification to Implementation for 5G and Beyond

Softwarization and virtualization in 5G and beyond necessitate thorough ...
research
11/12/2020

Machine Learning Interpretability Meets TLS Fingerprinting

Protecting users' privacy over the Internet is of great importance. Howe...

Please sign up or login with your details

Forgot password? Click here to reset