Security Testing

Our Security Testing is based on decade-long experiences of Vector in testing. We are the worldwide leader in testing equipment for automotive E/E. We are using a specific methodology for risk-based testing. While brute-force testing might sound appealing to detect weakness at any place, it is expensive and not effective. No test is complete, and brute-force PenTest for sure will overlook specific feature correlations.

Vector therefore has developed our own Grey-box Security Testing suite where we conduct a mini-TARA and on this basis, identify the attack vectors and test focus based on assets and risks. It is grey-box because we follow the black-box security testing approach, while considering specific risks due to attacks and implementation. For instance, a specific architecture or protocol – when known – invites specific attacks, such as CAN with DOS attacks. On this well-founded methodological basis, the security items in scope of the security engineering process are identified and agreed.

Feedback

"Vector Consulting Services is a good partner for Claas to implement cybersecurity. Claas had great benefits from the Vector team for TARA and Security Engineering."

- Alexander Grossmann, Manager, Claas

 

"Vector Consulting Services supported Panasonic with cybersecurity, demonstrating an outstanding level of expertise. The goal of a comprehensive TARA integrated into a security concept was achieved. The support was intense and very successful!"

- Michael Prantke, Project Manager, Panasonic

Fuzztesting

  • Frame fuzzing is used to check the general robustness of the device.  To detect any ‘silent’ services that may be available in the system but only activate upon receiving a CAN frame with a specific ID, a CAN-Frame Fuzzer is used which is able to generate random CAN frames within a configurable address range. 
  • Signal fuzzing is used on the database defined messages to target the application software of the DUT with forged signal data which may uncover unexpected behavior, like resets. Such behavior of the target may point to a software vulnerability which may be exploitable.

Pentesting

  • Interface Discovery: All available hardware interfaces of the system will be determined, and preliminary tests will be performed to detect target responsiveness towards communication attempts over the respective external interface.
  • Network Discovery: The network traffic will be analyzed to determine used protocols, communication patterns and determine the systems baseline behavior.
  • Network penetration test: With the information from network discovery, we are able to mount network-based attack against the system, using low-level access to the bus to stress the DUT with forged frames.
  • Software penetration test: Through reverse engineering vulnerabilities are searched and possible attack vectors determined.

FACTSHEET

Security Verification and Testing

Multi-level Security Verification, Validation and Hardening

“Vector Consulting supported Panasonic in cybersecurity, demonstrating outstanding expertise. The goal of a comprehensive TARA, integrated into a security concept, was achieved!” -  Michael Prantke, Panasonic