Abstract | ||
---|---|---|
Most of the advanced features in today's automobiles are performed by Electronic Control Units (ECUs) and an intra-vehicle communication network that allows these ECUs to exchange data. The most dominant intra-vehicle communication protocol is the Controller Area Network (CAN) protocol. The broadcast nature of CAN and the ability to access it through multiple interfaces in a vehicle, introduce an array of attack vectors that make vehicles vulnerable to cyber threats. CAN messages are proprietary to manufacturers, and their IDs and contents are guarded closely for intellectual property and security reasons. In this paper, an Automated Current-Based Fuzzing System (ACFS) is introduced. ACFS is a lightweight reverse engineering system that identifies CAN messages related to a specific user-vehicle interaction. It monitors and synchronizes variations in the data of CAN messages with current readings drawn from the vehicle's battery. Then, it passes the current signal through frequency analysis and filtering stage and associate changes in the output signal with the CAN bus traffic. As a result, a small group of candidate messages, related to a specific user-vehicle interaction, e.g., turning headlights on, are identified. The candidate messages are then played back on the vehicle CAN bus to identify the correct and desired message ID and data. This process allows the user to control specific actions in the vehicle without deep knowledge of its internal setup and functionality, simply by accessing the CAN bus. The ACFS system was tested on a 2017 production prototype BreadBoard Vehicle (BBV) and was able to automatically extract many of the messages that control headlights, turn signals, and information cluster. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/EIT51626.2021.9491907 | 2021 IEEE International Conference on Electro Information Technology (EIT) |
Keywords | DocType | ISSN |
BBV,vehicle battery,attack vectors,CAN bus traffic,intravehicle communication protocol,intravehicle communication network,broadcast nature,automated current-based fuzzing system,message ID,BreadBoard Vehicle,ACFS system,filtering stage,frequency analysis,lightweight reverse engineering system,intellectual property,CAN messages,Controller Area Network protocol,ECU,Electronic Control Units,automotive systems,intelligent approach | Conference | 2154-0357 |
ISBN | Citations | PageRank |
978-1-6654-4822-2 | 0 | 0.34 |
References | Authors | |
0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamad Ali Mokhadder | 1 | 0 | 0.34 |
Samar Bayan | 2 | 0 | 0.34 |
Utayba Mohammad | 3 | 0 | 0.34 |