Notices
C8 General Discussion The place to discuss the next generation of Corvette.
Sponsored by:
Sponsored by:

GM Won't Help Aftermarket Tuners Crack C8's ECU

Thread Tools
 
Search this Thread
 
Old 08-06-2021, 05:22 AM
  #21  
frodoz737
Le Mans Master
 
frodoz737's Avatar
 
Member Since: Oct 2019
Location: DFW Texas
Posts: 7,224
Received 461 Likes on 210 Posts
Default

Anything...can be cracked and hacked.
The following 2 users liked this post by frodoz737:
blkvett01 (08-09-2021), Dirtnap_TX (08-06-2021)
Old 08-06-2021, 10:36 AM
  #22  
Dirtnap_TX
Instructor
 
Dirtnap_TX's Avatar
 
Member Since: Aug 2019
Posts: 127
Received 66 Likes on 35 Posts
Default

Originally Posted by Jeff V.
That's not how it works. The calibration files are signed by GM before they're ever posted to their public facing servers. There's nothing to MITM.
And how does the ECU know the signature is good? I'm assuming they didn't put static keys or generate dynamic keys with a shared salt...

That said, I have not done a capture of the communication from the car yet so I don't know what calls it's making. I have reached out to the people most capable of breaking this to see if they're even looking at it yet.

Old 08-06-2021, 10:39 AM
  #23  
Dirtnap_TX
Instructor
 
Dirtnap_TX's Avatar
 
Member Since: Aug 2019
Posts: 127
Received 66 Likes on 35 Posts
Default

Originally Posted by shatter
California will now fail your car on smog if the ECU software has been modified in any way... so being able to modify the ECU software is no longer worth messing with here and I wouldn't be surprised if other states do the same.
This is why I think the future is piggybacks. Leave the ECU alone and just wrap it in something tuneable. As long as the ECU reports through an OBD check that all is good, then all should be good.

The following users liked this post:
shatter (08-06-2021)
Old 08-06-2021, 11:03 AM
  #24  
Phil1098
Race Director
 
Phil1098's Avatar
 
Member Since: Aug 2019
Location: Central Illinois
Posts: 10,089
Received 11,616 Likes on 4,644 Posts
Default

There were several on here that were absolutely adamant that within the first six months of the cars being on the road, it would be hacked and tuned. In a month the third year of build is happening and still nothing.
Old 08-06-2021, 11:28 AM
  #25  
foo.c
Pro
 
foo.c's Avatar
 
Member Since: Mar 2007
Posts: 545
Received 412 Likes on 187 Posts

Default

Originally Posted by Dirtnap_TX
This is why I think the future is piggybacks. Leave the ECU alone and just wrap it in something tuneable. As long as the ECU reports through an OBD check that all is good, then all should be good.
If you can't go through it, go around it.
Old 08-06-2021, 11:42 AM
  #26  
Zymurgy
Moderator

Support Corvetteforum!
 
Zymurgy's Avatar
 
Member Since: Feb 2006
Location: DFW Area TX
Posts: 35,675
Received 15,118 Likes on 6,190 Posts

Default

Except that all bus communication between various modules is encrypted.
Old 08-06-2021, 12:47 PM
  #27  
Jeff V.
Le Mans Master
 
Jeff V.'s Avatar
 
Member Since: Feb 2006
Location: Kansas City, MO
Posts: 5,978
Received 4,086 Likes on 1,971 Posts

Default

Originally Posted by Dirtnap_TX
And how does the ECU know the signature is good? I'm assuming they didn't put static keys or generate dynamic keys with a shared salt...

That said, I have not done a capture of the communication from the car yet so I don't know what calls it's making. I have reached out to the people most capable of breaking this to see if they're even looking at it yet.
The processor has a dedicated security co-processor that's got its own multi-layered security protocols. The public keys are stored there. Not that you can access them. You can't even get the data sheets for the security module without being an 'approved customer' by Freescale.

Originally Posted by Zymurgy
Except that all bus communication between various modules is encrypted.
It's not so much encrypted as authenticated. There's a group of DTC U codes for "message authentication code" failures. The upgraded CAN buses have signatures appended to their messages. If those signature checks fail, the car sets a U code and then potentially goes into limp mode.
The following users liked this post:
gbf_98070 (08-09-2021)
Old 08-06-2021, 08:13 PM
  #28  
Red Mist Rulz
Race Director
 
Red Mist Rulz's Avatar
 
Member Since: Sep 2016
Posts: 11,172
Received 8,560 Likes on 4,280 Posts
Default

Originally Posted by Dirtnap_TX
Um, no. The people I knew that hacked the Teslas and Dodge cars don't work at a speed shop either. Smart people like hard challenges. There are even events where they setup cars like this and invite people to hack them.

It'll get broken or made irrelevant.
The encryption in the C8 is an order of magnitude, or two, more difficult to crack than those cars you mention. As is the checking of encrypted keys between each computer module in the car, which is unique to each individual VIN. Crack the ECU from Car "A" and try to use it in car "B", and it won't work.

GM's new E99 ECM in the 2020 C8 Corvettes involves multi-factor authentication involving dealer employees & credentials and a Diffie-Hellman 2048-bit key exchange using a SHA-256 hash digest that is unique for each VIN PCM & TCM.

The Diffie-Hellman 2048/SHA-256 ECM/TCM is not a STATIC security implementation, it is currently un-crackable by even the best in the aftermarket tuning world.
Current estimates to crack Diffie-Hellman 1024 is 35,000,000 core years.
It would take 35 million CPU cores 1 year to crack a single key exchange, and the key exchange is unique for each VIN. Diffie-Hellman 2048
Forget about it, not going to happen.

Now then, a stand-alone aftermarket PCM that could partially by pass the rolling code encryptions momentarily will cut off factory instrument cluster, HVAC, audio, BCM, power windows and eventually will obtain authentication error which will alert On-Star Remote to shutdown the car.
None of it will work because it has security dependencies on the factory ECM. Every module that communicates with the PCM/TCM uses 2048-bit Diffie-Hellman key exchange with a SHA-256.

Successfully flash-tuning, reprogramming & otherwise altering the engine control unit to increase power output on the 2020 C8 will be next to impossible.
The anti-hacking encryption written into the electronic control module will block any attempt to "read, write, and/or replace the standard ECU of the C8.
If the ECU detects such an effort, and that programming event fails, the Corvette C8 will enter a "recovery mode" that requires a reboot.

The C8 can be reprogrammed but that is only GM software, and only by an entity with the proper encryption keys - meaning a trip on a flatbed to the dealer and a sure fire way to completely void your entire warranty.

The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher

Ephemeral Diffie-Hellman – This is considered the most secure implementation because it provides perfect forward secrecy. It is generally combined with an algorithm such as DSA or RSA to authenticate one or both of the parties in the connection

Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.

DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography.
Traditionally, secure encrypted communication between two parties required that they first exchange keys by some secure physical means, such as paper key lists transported by a trusted courier.

The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.

Diffie–Hellman is used to secure a variety of Internet services. However, research published in October 2015 suggests that the parameters in use for many DH Internet applications at that time are not strong enough to prevent compromise by very well-funded attackers, such as the security services of large governments.

The scheme was published by Whitfield Diffie and Martin Hellman in 1976, but in 1997 it was revealed that James H. Ellis, Clifford *****, and Malcolm J. Williamson of GCHQ, the British signals intelligence agency, had previously shown in 1969 how public-key cryptography could be achieved.

Although Diffie–Hellman key agreement itself is a non-authenticated key-agreement protocol, it provides the basis for a variety of authenticated protocols, and is used to provide forward secrecy in Transport Layer Security's ephemeral modes (referred to as EDH or DHE depending on the cipher suite).

The method was followed shortly afterwards by RSA, an implementation of public-key cryptography using asymmetric algorithms.

Last edited by Red Mist Rulz; 08-06-2021 at 08:20 PM.
Old 08-06-2021, 08:17 PM
  #29  
Red Mist Rulz
Race Director
 
Red Mist Rulz's Avatar
 
Member Since: Sep 2016
Posts: 11,172
Received 8,560 Likes on 4,280 Posts
Default

Originally Posted by Dirtnap_TX
This is why I think the future is piggybacks. Leave the ECU alone and just wrap it in something tuneable. As long as the ECU reports through an OBD check that all is good, then all should be good.
This is likely the only way the car will be tuned, but it definitely has it's limits compared to modifying the ECU itself.
Old 08-06-2021, 08:44 PM
  #30  
Shokosugi
Drifting
 
Shokosugi's Avatar
 
Member Since: Jun 2020
Location: San Jose
Posts: 1,520
Received 1,872 Likes on 783 Posts
Default

Anyone have Cicio’s Stage 3 kit? They are using a piggyback system.
Old 08-06-2021, 08:53 PM
  #31  
Dirtnap_TX
Instructor
 
Dirtnap_TX's Avatar
 
Member Since: Aug 2019
Posts: 127
Received 66 Likes on 35 Posts
Default

Originally Posted by DSOMrulz
This is likely the only way the car will be tuned, but it definitely has it's limits compared to modifying the ECU itself.
Short term, yes. Long term, there will be key leaks, and even longer term, the ECU will either be cracked or replaced with something tunable. If not, the long term value of these cars is not going to be good.

BTW, Diffie–Hellman is a key exchange and susceptible to MITM attacks. You wouldn't brute force it. What they've done is combined several security methodologies and it'll take someone going through a series of hurdles to break it. This is why it's not been broken in the 2 years it's been out I'm sure. Honestly, if it's not broken by the time my warranty is up, I may sell and buy something more consumer friendly.
Old 08-06-2021, 09:34 PM
  #32  
RKCRLR
Le Mans Master
 
RKCRLR's Avatar
 
Member Since: Aug 2016
Location: Garden Valley CA
Posts: 9,177
Received 6,202 Likes on 3,403 Posts
Default

Originally Posted by Dirtnap_TX
Short term, yes. Long term, there will be key leaks, and even longer term, the ECU will either be cracked or replaced with something tunable. If not, the long term value of these cars is not going to be good.
In the long term, unmodified cars hold their value the most.

Last edited by RKCRLR; 08-06-2021 at 09:34 PM.
The following 5 users liked this post by RKCRLR:
Chemdawg99 (02-11-2023), JD'S WHITE 93 (02-12-2023), OLD_GOAT (08-07-2021), Phil1098 (08-07-2021), stevesvette (02-13-2023)
Old 08-07-2021, 09:09 AM
  #33  
Dirtnap_TX
Instructor
 
Dirtnap_TX's Avatar
 
Member Since: Aug 2019
Posts: 127
Received 66 Likes on 35 Posts
Default

Originally Posted by RKCRLR
In the long term, unmodified cars hold their value the most.
How well to non-repairable cars do?

Here is where I think we're headed: https://www.bloomberg.com/news/featu...00-000-tractor
Old 08-07-2021, 09:22 AM
  #34  
bartruff1
Racer
 
bartruff1's Avatar
 
Member Since: Feb 2010
Posts: 329
Received 269 Likes on 121 Posts

Default

Originally Posted by BADBIRDCAGE
Why would anyone give out access to proprietary information?
Exactly....... they might sell it or license it but why would they give it away....??....
Old 08-07-2021, 09:24 AM
  #35  
Phil1098
Race Director
 
Phil1098's Avatar
 
Member Since: Aug 2019
Location: Central Illinois
Posts: 10,089
Received 11,616 Likes on 4,644 Posts
Default

Originally Posted by Dirtnap_TX
How well to non-repairable cars do?

Here is where I think we're headed: https://www.bloomberg.com/news/featu...00-000-tractor
I read the whole article, I never saw where a Deere dealer can't fix a machine. Are you saying after the factory warranty is out, a Chevy dealer won't be able to repair a C8? Obviously the market completely agrees with you based on the thousands of C8s sitting on dealers lots with no buyers. With the level of sophistication current cars have, a fraction of a percent of the owners even dream of modding them to the point of needing to be in an ECM.
The following users liked this post:
stevesvette (02-13-2023)
Old 08-07-2021, 12:19 PM
  #36  
Jeff V.
Le Mans Master
 
Jeff V.'s Avatar
 
Member Since: Feb 2006
Location: Kansas City, MO
Posts: 5,978
Received 4,086 Likes on 1,971 Posts

Default

Originally Posted by Dirtnap_TX
Short term, yes. Long term, there will be key leaks, and even longer term, the ECU will either be cracked or replaced with something tunable. If not, the long term value of these cars is not going to be good.

BTW, Diffie–Hellman is a key exchange and susceptible to MITM attacks. You wouldn't brute force it. What they've done is combined several security methodologies and it'll take someone going through a series of hurdles to break it. This is why it's not been broken in the 2 years it's been out I'm sure. Honestly, if it's not broken by the time my warranty is up, I may sell and buy something more consumer friendly.
Key leaks. Right. How often does that happen in the real world? People keep saying this like some rogue employee can just copy down the key from a post-it note stuck to the side of the server. That's not how it works. If you've got a news story about someone stealing and leaking private encryption key from any serious commercial company then please, post it up.

Old 08-07-2021, 01:02 PM
  #37  
BIG Dave
Le Mans Master
 
BIG Dave's Avatar
 
Member Since: Dec 1999
Location: One Hour From Boston!
Posts: 6,408
Received 4,684 Likes on 1,862 Posts

Default

GM Won't Help Aftermarket Tuners Crack C8's ECU“

Aside from Callaway, has GM ever helped any aftermarket tuner with Corvette coding? Why should now be any different?


Last edited by BIG Dave; 08-07-2021 at 01:02 PM.

Get notified of new replies

To GM Won't Help Aftermarket Tuners Crack C8's ECU

Old 08-07-2021, 02:21 PM
  #38  
Shodanusmc
Burning Brakes
 
Shodanusmc's Avatar
 
Member Since: Sep 2008
Location: Illinois
Posts: 767
Received 133 Likes on 91 Posts

Default

Originally Posted by BIG Dave
GM Won't Help Aftermarket Tuners Crack C8's ECU“

Aside from Callaway, has GM ever helped any aftermarket tuner with Corvette coding? Why should now be any different?
I did hear they may or are throwing Calloway a bone. No doubt a Turbo or screw. That has to be a min of a 100 HP bump when available for 20-25k
Old 08-07-2021, 08:18 PM
  #39  
CP
Team Owner
 
CP's Avatar
 
Member Since: Aug 2000
Location: Spring Texas
Posts: 23,187
Received 1,126 Likes on 563 Posts

Default

In 20 years, who's going to have an ECU that will be able to communicate with the rest of the computers in the car? Will there have to be whole car computer replacements to get just one working? Who will be around to program them? Will the computer language now still be around (COBOL, PL1, FORTRAN, etc.)? This is going to get messy in the not too distant future.
Old 08-07-2021, 10:47 PM
  #40  
dohabandit
Melting Slicks
 
dohabandit's Avatar
 
Member Since: May 2021
Posts: 2,380
Received 1,444 Likes on 804 Posts
Default

Originally Posted by DSOMrulz
The encryption in the C8 is an order of magnitude, or two, more difficult to crack than those cars you mention. As is the checking of encrypted keys between each computer module in the car, which is unique to each individual VIN. Crack the ECU from Car "A" and try to use it in car "B", and it won't work.
It just so happens I do work in cybersecurity, embedded systems, PKI / cryptography, etc.
If they are using x.509 certificates with a private key stored within a HSM like a FIPS140-2 container or some sort of TPM, it could be very hard if not impossible to crack this system. Far beyond what some tuner is going to be able to invest in.

Firmware is probably also digitally signed by a trusted CA, so the ECU will first validate the CRC on the download (to ensure not corrupted) and then perform certificate trust path processing to validate it is "authentic" by checking the signing certificate thumbprint hash. With the OnStar system being 2-way, it is also possible they can update this certificate trust and probably revoke certificates as well. If they built some sort of tamper protection in the system, I suppose they could also brick your ECU by revoking whatever certificate it was issued.

I wonder though, if they actually use a common signing key for these modules, or if they are generating new identity / signing certificates for each module as it rolls off the factory line? If they used a single common certificate and someone compromised the private keys, then it would be a big win for the tuner community.

The other approaches suggest just performing a man-in-the-middle attack by placing something between the ECU and the TCM for instance. Depending on how the communication protocol is done, this might also fail if all messages are authenticated and a nonce is used to circumvent playback attacks.

Has anyone put a logic analyzer on the CAN bus and captured some traffic between the ECU and TCM?

I wonder if the private keys are stored in a battery backed SRAM with a tamper detection switch on the ECU module causing those keys to be dumped/zeroized?
If you can open up the ECU while it is running, it might be possible to install an in-circuit-emulator, or logic analyzer on the microprocessor and snoop on the data bus. If you could identify which section of code is performing the CANBUS message validation and insert some NO-OP's.... you would probably also have to get around any sort of bootloader security they have in place too. If it is anything like Samsung KNOX type security, they may have some e-fuses in there and once a tamper event is detected, they will blow those fuses and then you are TOAST!

Needless to say, I won't be volunteering to tinker with this on my new C8. There is probably some fine print somewhere on my purchase agreement that would be used by GM to sue me into oblivion too.

Last resort is to rip these components out and build your own from scratch, including all the functions of the DCT TCM. The engineering challenge and cost this would incur makes this also very unlikely to occur.

If the GM field techs have a device that allows them to install replacement parts, I would also wonder if the parts come from GM already matched to the vehicle VIN so other modules will accept the signing keys, or does the field tech use a programmer? Might be an opportunity for an exploit there...
If certificate programming is done through some process in the field, could you trick this system into issuing you a new or derivative certificate?



The following 2 users liked this post by dohabandit:
LegoZ (08-11-2021), NoMatter (08-10-2021)


Quick Reply: GM Won't Help Aftermarket Tuners Crack C8's ECU



All times are GMT -4. The time now is 03:03 AM.