Secure OTA Software Update Flashcards
Advantages of OTA
Cost saving
Time saving (issues spotted to fixed, frequency of updates)
Higher customer satisfaction
Increase values (devices and manufacturer revenue)
General Update Process
Packing: Develop → Pack → Sign
Delivery: Send/receive (encrypted or not)
Authentication: Check signature
Attestation: Send signed info
OTA Update Security Concerns
Software/firmware update packages: tampering, replay, IP
disclosure.
Installed software: tampering, blocking.
Hardware: Tampering
Users: Privacy, Safety.
Cloud server (Backend): Availability.
OTA Update Challenges
Hardware limitation
Connectivity and Reachability
Complex software distribution
Attacker model
Possible actions that attackers can do:
Intercept communication either between the devices and the update servers.
Modify the content of messages on these communication channels.
Inject malicious software into devices/components.
Obtain/Modify cryptographic keys stored on devices or update servers.
OTA update approaches
Symmetric encryption
Hash function
Asymmetric key
Hardware security module
Secure update framework
Symmetric encryption: Pros and Cons
Pros:
Efficient and fast execution
Secure link
Cons
High bandwidth
Limited scalability
Hash Function: Pros and Cons
Pros:
Efficient and fast execution
Scalable
Cons
High memory
DoS attack
Hardware Security Module: Pros and Cons
Pros:
Physical security
Secure execution
Cons
High cost