skip to main content
10.1145/2746266.2746267acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions

Published:07 April 2015Publication History

ABSTRACT

Vehicles made within the past years have gradually become more and more complex. As a result, the embedded computer systems that monitor and control these systems have also grown in size and complexity. Unfortunately, the technology that protects them from external attackers has not improved at a similar rate. In this paper we discuss the vulnerabilities of modern in-vehicle networks, focusing on the Controller Area Network (CAN) communications protocol as a primary attack vector. We discuss the vulnerabilities of CAN, the types of attacks that can be used against it, and some of the solutions that have been proposed to overcome these attacks.

References

  1. Fernandez, John D., and Andres E. Fernandez. "SCADA systems: vulnerabilities and remediation." Journal of Computing Sciences in Colleges20.4 (2005): 160--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Nilsson, Dennis K., Phu H. Phung, and Ulf E. Larson. "Vehicle ECU classification based on safety-security characteristics." Road Transport Information and Control-RTIC 2008 and ITS United Kingdom Members' Conference, IET. IET, 2008.Google ScholarGoogle Scholar
  3. Wolf, Marko, André Weimerskirch, and Christof Paar. "Security in automotive bus systems." Workshop on Embedded Security in Cars. 2004.Google ScholarGoogle Scholar
  4. Texas Instruments. Introduction to the Controller Area Network (CAN). SLOA101A. Dallas, TX. 2008.Google ScholarGoogle Scholar
  5. Checkoway, Stephen, et al. "Comprehensive Experimental Analyses of Automotive Attack Surfaces." USENIX Security Symposium. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Koscher, Karl, et al. "Experimental security analysis of a modern automobile."Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kleberger, Pierre, Tomas Olovsson, and Erland Jonsson. "Security aspects of the in-vehicle network in the connected car." Intelligent Vehicles Symposium (IV), 2011 IEEE. IEEE, 2011.Google ScholarGoogle Scholar
  8. Vasilev, Pavel. Driver's Efficiency Analyzer. Diss. Cornell University, 2012.Google ScholarGoogle Scholar
  9. Pagliery, Jose. "Your car is a giant computer-and it can be hacked." CNN Money. Web. 2 June, 2014.Google ScholarGoogle Scholar
  10. Miller, Charlie, and Chris Valasek. "Adventures in Automotive Networks and Control Units." Last Accessed from http://illmatics. com/car_ hacking. pdf on13 (2013).Google ScholarGoogle Scholar
  11. Hoppe, Tobias, Stefan Kiltz, and Jana Dittmann. "Security threats to automotive CAN networks--practical examples and selected short-term countermeasures." Computer Safety, Reliability, and Security. Springer Berlin Heidelberg, 2008. 235--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Phung, Phu H., and Dennis Kengo Nilsson. "A model for safe and secure execution of downloaded vehicle applications." (2010): 06--06.Google ScholarGoogle Scholar
  13. Groza, Adrian, Bogdan Iancu, and Anca Marginean. "A multi-agent approach towards cooperative overtaking in vehicular networks." Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14). ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. . "Vehicle-to-vehicle safety application research plan." USDOT. Oct 2011.Google ScholarGoogle Scholar
  15. Larson, Ulf E., and Dennis K. Nilsson. "Securing vehicles against cyber attacks." Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kargl, Frank. "Securing the intelligent vehicles of the future." (2013).Google ScholarGoogle Scholar
  17. Gerdes, Ryan M., Chris Winstead, and Kevin Heaslip. "CPS: an efficiency-motivated attack against autonomous vehicular transportation." Proceedings of the 29th Annual Computer Security Applications Conference. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Schulze, Sandro, et al. "On the Need of Data Management in Automotive Systems." BTW. Vol. 144. 2009.Google ScholarGoogle Scholar
  19. Ling, Congli, and Dongqin Feng. "An Algorithm for Detection of Malicious Messages on CAN Buses." 2012 National Conference on Information Technology and Computer Science. Atlantis Press, 2012.Google ScholarGoogle Scholar
  20. Oguma, Hisashi, et al. "New attestation based security architecture for in-vehicle communication." Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008.Google ScholarGoogle Scholar

Index Terms

  1. In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CISR '15: Proceedings of the 10th Annual Cyber and Information Security Research Conference
            April 2015
            99 pages
            ISBN:9781450333450
            DOI:10.1145/2746266

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 April 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            CISR '15 Paper Acceptance Rate18of36submissions,50%Overall Acceptance Rate69of136submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader