Abstract | ||
---|---|---|
There is increasing computational complexity within the connected car, and with the advent of autonomous vehicles, how do manufacturers test for cyber-security assurance? The fuzz test is a successful black box testing method that hackers have used to find security weaknesses in various domains. Therefore, should the fuzz test, mentioned (without any details) in SAE J3061, be applied more widely into the vehicle systems development process to help reduce vulnerabilities? To investigate this question a custom fuzzer was developed to allow for experimentation against a target vehicle's CAN bus (used as the data interconnect for the vehicle's ECUs). The results demonstrate that the fuzz test has a part to play as one of the many security tests that a vehicle's systems need to undergo before being made ready for series production. However, previous problems raised when cyber testing a vehicle were confirmed. Thus, in adding the fuzz test to the automotive engineering tool box some issues are raised that need addressing in future research. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/DSN-W.2018.00070 | 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) |
Keywords | Field | DocType |
fuzz test,automotive,non functional testing,cyber security resilience,CAN bus,vehicle systems testing | CAN bus,Fuzz testing,Computer security,Computer science,Hacker,White-box testing,Software,System development,Vulnerability,Automotive industry | Conference |
ISSN | ISBN | Citations |
2325-6648 | 978-1-5386-6708-8 | 2 |
PageRank | References | Authors |
0.38 | 6 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel S. Fowler | 1 | 3 | 0.75 |
Jeremy W. Bryans | 2 | 175 | 13.88 |
Siraj A. Shaikh | 3 | 90 | 13.85 |
Paul Wooderson | 4 | 5 | 1.54 |