Activiteiten per jaar
Samenvatting
The secure functioning of automotive systems is vital to the safety of their passengers and other roadway users. One of the critical functions for safety is the controller area network (CAN), which interconnects the safety-critical electronic control units (ECUs) in the majority of ground vehicles. Unfortunately CAN is known to be vulnerable to several attacks. One such attack is the bus-off attack, which can be used to cause a victim ECU to disconnect itself from the CAN bus and, subsequently, for an attacker to masquerade as that ECU. A limitation of the bus-off attack is that it requires the attacker to achieve tight synchronization between the transmission of the victim and the attacker’s injected message. In this paper, we introduce a schedule-based attack framework for the CAN bus-off attack that uses the real-time schedule of the CAN bus to predict more attack opportunities than previously known. We describe a ranking method for an attacker to select and optimize its attack injections with respect to criteria such as attack success rate, bus perturbation, or attack latency. The results show that vulnerabilities of the CAN bus can be enhanced by schedule-based attacks.
Originele taal-2 | Engels |
---|---|
Titel | Proceedings - 2021 IEEE 42nd Real-Time Systems Symposium, RTSS 2021 |
Uitgeverij | Institute of Electrical and Electronics Engineers |
Pagina's | 495-507 |
Aantal pagina's | 13 |
ISBN van elektronische versie | 9781665428026 |
ISBN van geprinte versie | 978-1-6654-2802-6 |
DOI's | |
Status | Gepubliceerd - 7 dec. 2021 |
Evenement | 42nd IEEE Real-Time Systems Symposium, RTSS 2021 - Dortmund, Duitsland Duur: 7 dec. 2021 → 10 dec. 2021 Congresnummer: 42 http://2021.rtss.org/ |
Congres
Congres | 42nd IEEE Real-Time Systems Symposium, RTSS 2021 |
---|---|
Verkorte titel | RTSS 2021 |
Land/Regio | Duitsland |
Stad | Dortmund |
Periode | 7/12/21 → 10/12/21 |
Internet adres |
Bibliografische nota
Funding Information:This work is partially supported by NSF CNS-2046705, NSF CNS-2011620, NSF OAC-2001789, and Colorado State Bill 18-086.
Financiering
This work is partially supported by NSF CNS-2046705, NSF CNS-2011620, NSF OAC-2001789, and Colorado State Bill 18-086.
Vingerafdruk
Duik in de onderzoeksthema's van 'Vulnerability of Controller Area Network to Schedule-Based Attacks'. Samen vormen ze een unieke vingerafdruk.Activiteiten
- 2 Genodigd spreker
-
Invited talk at UvA: "The past, present, and future trends in real-time systems design"
Nasri, M. (Spreker)
6 sep. 2023Activiteit: Types gesprekken of presentaties › Genodigd spreker › Wetenschappelijk
-
Keynote at CompSys 2023: "The right action at the right time: past, present, and future trends in real-time systems design"
Nasri, M. (Spreker)
28 jun. 2023Activiteit: Types gesprekken of presentaties › Genodigd spreker › Wetenschappelijk