首页> 外文会议>Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust >Malicious CAN-message attack against advanced driving assistant system
【24h】

Malicious CAN-message attack against advanced driving assistant system

机译:针对高级驾驶辅助系统的恶意CAN消息攻击

获取原文
获取原文并翻译 | 示例

摘要

Along with the progress of connected vehicles, cyber-attacks exploiting the vulnerability of vehicle network have been reported in research papers. Against threat of such attacks, there have been proposed various countermeasures such as disturbing the malicious message by utilizing the transmission period, or invalidating the received message by checking the Message Authentication Code (MAC). In addition, the security of sensor of vehicle is also attracted with the rapid development of autonomous vehicle technique. In this paper, we studied the vulnerability of Advanced Driving Assistance System (ADAS) widely mounted on recent vehicles. In our experiments, the emergency brake system is activated easier than the normal brake system (parking brake, brake pedal) by sending the fake ADAS-ECU message from the ODB-II port. The previously proposed countermeasures utilizing the message transmission period is difficult to apply in the emergency, since the control-message-interval deviates from the normal transmission cycle. Moreover, the ADAS system is invalidated by deceiving other ECUs and range-finding sensors. We focus on checksum included in the current data field separately from CRC field of CAN message and suggest the MAC scheme without a greatly changing the existing vehicle infrastructure. The robustness on the emergency, the amount of payload increased, and the possibility of spoofing attack is investigated.
机译:随着联网车辆的发展,研究论文中报道了利用车辆网络漏洞的网络攻击。针对这种攻击的威胁,已经提出了各种对策,例如通过利用传输时间段来干扰恶意消息,或者通过检查消息认证码(MAC)来使接收到的消息无效。另外,自动驾驶技术的迅速发展也吸引了车辆传感器的安全性。在本文中,我们研究了广泛安装在最新车辆上的高级驾驶辅助系统(ADAS)的脆弱性。在我们的实验中,通过从ODB-II端口发送伪造的ADAS-ECU消息,比常规制动系统(停车制动,制动踏板)更容易激活紧急制动系统。由于控制消息间隔不同于正常的发送周期,因此先前提出的利用消息发送周期的对策很难应用于紧急情况。此外,通过欺骗其他ECU和测距传感器使ADAS系统失效。我们将重点放在与CAN消息的CRC字段分开的当前数据字段中包含的校验和上,并建议MAC方案,而不会大大改变现有的车辆基础设施。研究了紧急情况下的鲁棒性,有效载荷的数量增加以及欺骗攻击的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号