Overview
Learn about efficient automotive USB fuzzing techniques in this DEF CON 31 Car Hacking Village presentation. Discover how to perform direct USB fuzzing on vehicles by connecting fuzzers directly to cars, moving beyond traditional inefficient commercial media fuzzing methods that require extensive manual testing. Explore practical approaches to both kernel area and media fuzzing, demonstrated through real-world vulnerability discoveries in vehicles like Volkswagen Jetta, Renault Zoe, and GM Chevrolet Equinox. Master key concepts including USB gadget mode configuration, malformed media file generation, failure detection mechanisms, and kernel driver fuzzing using raw gadget implementations. Follow along with detailed demonstrations and gain insights into testing methodologies that can be applied to actual vehicles, complete with Syzkaller reproduction codes and practical vulnerability examples.
Syllabus
Intro
USB Fuzzing in the Automotive Industry
Current USB Fuzzing Procedures
New USB Fuzzing for Car
Remove the limitations
Automotive Media Player Fuzzing by USB
USB Gadget Mode Init Configuration
How to generate malformed media files?
Failure Detection
How to detect failures?
How to fuzz USB kernel drivers?
Fuzzing USB with Raw Gadget
Syzkaller Reproduction Codes
How to test with real cars?
Vulnerabilities
Demo #4: Kernel
Conclusion
Taught by
DEFCONConference