Comprehensive Automotive Security: From Classic Vehicle Networks to Advanced Ethernet Protocols

This two-day training is designed to provide a holistic view of automotive security, combining traditional in-vehicle network fundamentals with modern Ethernet-based protocols and testing. Attendees will first explore low-level automotive communication and hardware reverse engineering, then dive into Ethernet-specific stacks and security mechanisms like Diagnostics over IP (DoIP), VLAN configuration, TLS encryption, and SOME/IP.

Day 1: Classic Automotive Security

1. Vehicle Network Fundamentals

  • Introduction to CAN, ISO-TP, and UDS
  • Understanding typical in-vehicle architectures and communication flows
  1. Hardware Reverse Engineering
  • Exploring ECU internals: board layout, component identification, and data extraction
  • Debug interfaces (e.g., JTAG, SWD) and secure handling practices
  1. Hands-on Diagnostics and Attacks
  • Sending and interpreting UDS requests/responses
  • Identifying vulnerabilities in traditional ECUs
  • Practical exercises using open-source tools (e.g., Scapy, Python scripts)

Day 2: Ethernet-Based Automotive Networks

1. Ethernet Basics in Automotive

  • Differences between 100/1000BASE-T and 100/1000BASE-T1
  • VLAN setup, segmentation, and troubleshooting
  1. Diagnostics over IP (DoIP)
  • Message flow and session management
  • Analyzing DoIP traffic and potential security pitfalls
  1. TLS and Secure Communications
  • Certificate handling and encryption best practices
  • Testing TLS configurations using testssl.sh and related tools
  • Fuzzing and stress-testing with Frankencert
  1. Advanced Protocols and Implementations
  • Introduction to Some/IP, AUTOSAR PDUs, and proprietary automotive protocols
  • Capturing and injecting Ethernet frames with Scapy for protocol manipulation
  • Combining DoIP, TLS, and VLAN concepts for end-to-end security
  1. Practical Labs and Troubleshooting
  • Network scanning, sniffing, and injection with Wireshark, tcpdump, and Scapy
  • Realistic attack simulation on an Ethernet-based ECU setup
  • Best practices and mitigation strategies

About the Speakers