Vulnerability of Controller Area Network to Schedule-Based Attacks

Sena Hounsinou, Mark Stidd, Uchenna Ezeobi, Habeeb Olufowobi, Mitra Nasri, Gedare Bloom

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

9 Citaten (Scopus)

Samenvatting

The secure functioning of automotive systems is vital to the safety of their passengers and other roadway users. One of the critical functions for safety is the controller area network (CAN), which interconnects the safety-critical electronic control units (ECUs) in the majority of ground vehicles. Unfortunately CAN is known to be vulnerable to several attacks. One such attack is the bus-off attack, which can be used to cause a victim ECU to disconnect itself from the CAN bus and, subsequently, for an attacker to masquerade as that ECU. A limitation of the bus-off attack is that it requires the attacker to achieve tight synchronization between the transmission of the victim and the attacker’s injected message. In this paper, we introduce a schedule-based attack framework for the CAN bus-off attack that uses the real-time schedule of the CAN bus to predict more attack opportunities than previously known. We describe a ranking method for an attacker to select and optimize its attack injections with respect to criteria such as attack success rate, bus perturbation, or attack latency. The results show that vulnerabilities of the CAN bus can be enhanced by schedule-based attacks.

Originele taal-2Engels
TitelProceedings - 2021 IEEE 42nd Real-Time Systems Symposium, RTSS 2021
UitgeverijInstitute of Electrical and Electronics Engineers
Pagina's495-507
Aantal pagina's13
ISBN van elektronische versie9781665428026
ISBN van geprinte versie978-1-6654-2802-6
DOI's
StatusGepubliceerd - 7 dec. 2021
Evenement42nd IEEE Real-Time Systems Symposium, RTSS 2021 - Dortmund, Duitsland
Duur: 7 dec. 202110 dec. 2021
Congresnummer: 42
http://2021.rtss.org/

Congres

Congres42nd IEEE Real-Time Systems Symposium, RTSS 2021
Verkorte titelRTSS 2021
Land/RegioDuitsland
StadDortmund
Periode7/12/2110/12/21
Internet adres

Bibliografische nota

Funding Information:
This work is partially supported by NSF CNS-2046705, NSF CNS-2011620, NSF OAC-2001789, and Colorado State Bill 18-086.

Financiering

This work is partially supported by NSF CNS-2046705, NSF CNS-2011620, NSF OAC-2001789, and Colorado State Bill 18-086.

Vingerafdruk

Duik in de onderzoeksthema's van 'Vulnerability of Controller Area Network to Schedule-Based Attacks'. Samen vormen ze een unieke vingerafdruk.

Citeer dit