Abstract | ||
---|---|---|
There is a need for new tools and techniques to aid automotive engineers performing cybersecurity testing on connected car systems. This is in order to support the principle of secure-by-design. Our research has produced a method to construct useful automotive security tooling and tests. It has been used to implement Controller Area Network (CAN) fuzz testing (a dynamic security test) via a prototype CAN fuzzer. The black-box fuzz testing of a laboratory vehicle's display ECU demonstrates the value of a fuzzer in the automotive field, revealing bugs in the ECU software, and weaknesses in the vehicle's systems design. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/QRS-C.2019.00015 | 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) |
Keywords | Field | DocType |
cybersecurity testing,controller area network,fuzz testing,automotive engineering,system security,embedded systems,dynamic software testing,black-box testing,SAE J3061 | CAN bus,Fuzz testing,Computer security,Computer science,Systems design,Automotive security,White-box testing,Software,Automotive industry | Conference |
ISBN | Citations | PageRank |
978-1-7281-3926-5 | 1 | 0.36 |
References | Authors | |
0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel S. Fowler | 1 | 3 | 0.75 |
Jeremy W. Bryans | 2 | 175 | 13.88 |
Madeline Cheah | 3 | 18 | 2.75 |
Paul Wooderson | 4 | 5 | 1.54 |
Siraj A. Shaikh | 5 | 90 | 13.85 |