Integrity & Authenticity of Software Updates
Under UNECE R156, every software update must be protected for integrity (untampered content) and authenticity (trusted origin). This page outlines a practical chain of trust for packaging, delivery, installation, and recording, aligned with ISO 24089 engineering practices and R155 risk treatment.
Objectives
- Ensure only authorized and untampered packages are installed.
 - Prevent rollback to vulnerable versions and block unauthorized targets.
 - Provide verifiable records for audits and incident investigations.
 
End-to-End Chain of Trust
- Build & Package – reproducible builds (where feasible), metadata/SBOM, hashes.
 - Sign – apply approved key and signing policy; record signer identity and time.
 - Distribute – authenticated transport; protect at rest and in transit.
 - Verify – on-vehicle (and backend) signature verification and hash checks.
 - Eligibility – enforce VIN/ECU targeting, dependencies, and preconditions.
 - Anti-Rollback – monotonic version/counter checks; secure storage for state.
 - Record – persist outcome with timestamps, versions, and cryptographic references.
 
Key & PKI Management
- Root of trust: managed by OEM; keys generated and stored in HSMs; documented custody.
 - Key tiers: root/intermediate/signing keys with explicit usage and lifetimes.
 - Rotation & revocation: defined schedules and emergency procedures; CRLs/OCSP or embedded lists.
 - Access control: dual control for sensitive operations; auditable key usage logs.
 - Supplier keys: trust delegation and approval process; scope-limited certificates.
 
Signing Policy & Package Metadata
- What to sign: binaries, manifests/metadata, dependency graphs, eligibility rules, SBOM.
 - Algorithms & parameters: centrally governed; track transitions (e.g., deprecations).
 - Timestamps & provenance: capture build IDs, tool versions, commit hashes.
 - Detached vs. attached signatures: choose per transport/storage constraints; document decision.
 
On-Vehicle Verification
- Secure boot validates boot chain and enforces trusted loaders.
 - Pre-install checks: signature, hash, version, and dependency validation.
 - Transactional install: A/B slots or equivalent; automatic revert on failure.
 - Key material: protect trust anchors (e.g., fuses/SE/HSM); plan for anchor rotation.
 
Eligibility & Anti-Rollback
- Eligibility rules: VIN/ECU whitelist, region/market, hardware rev, prerequisite versions.
 - Anti-rollback: monotonic counters or secure versioning; store state in tamper-resistant memory.
 - Downgrade exceptions: allow only with signed, explicit waiver and additional controls.
 
Backend & Transport Controls
- Mutual authentication between vehicle and backend/service tools.
 - Confidentiality where required (e.g., pre-release campaigns); rate-limit and replay protection.
 - Hardening of dealer tools: attested software, access control, and audit logs.
 
Threat Considerations
- Signature forgery or key compromise → HSM, dual control, rapid revocation plan.
 - Manifest tampering → sign manifests and enforce strict parsing/verification.
 - Eligibility bypass → enforce checks on both backend and vehicle; defense-in-depth.
 - Rollback attacks → non-volatile counters and signed downgrade waivers.
 - Supply chain risk → SBOMs, provenance metadata, and supplier attestations.
 
Assurance & Testing
- Static/dynamic analysis of update agent and parsers; fuzz manifests and transport layers.
 - Adversarial testing of eligibility checks, rollback logic, and failure handling.
 - Key lifecycle drills: rotation/revocation exercises; signing key disaster recovery.
 - Red-team exercises on dealer tools and backend interfaces.
 
Typical Outputs / Evidence
- Key management policy, PKI hierarchy, and HSM configuration/attestations.
 - Signing policy (algorithms, parameters, validity), rotation/revocation procedures.
 - Package manifests, SBOMs, signatures, hashes, and provenance records.
 - Vehicle verification specs (secure boot, eligibility, anti-rollback) and test results.
 - Transport/authentication specs for OTA and service tools; audit logs and access records.
 - Revocation events, incident links, and lessons-learned updates to the SUMS.
 
                        Disclaimer: This page summarizes integrity and authenticity expectations under UNECE R156.
                        For authoritative requirements, consult the regulation text and your approval authority’s guidance.