2017
DOI: 10.1007/978-3-319-60876-1_9
|View full text |Cite
|
Sign up to set email alerts
|

A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks

Abstract: Modern vehicles incorporate tens of electronic control units (ECUs), driven by as much as 100,000,000 lines of code. They are tightly interconnected via internal networks, mostly based on the CAN bus standard. Past research showed that, by obtaining physical access to the network or by remotely compromising a vulnerable ECU, an attacker could control even safety-critical inputs such as throttle, steering or brakes. In order to secure current CAN networks from cyberattacks, detection and prevention approaches b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(56 citation statements)
references
References 11 publications
0
49
0
Order By: Relevance
“…Given the vulnerabilities of the CAN bus [13], [157], [158], a number of mechanisms have been proposed: (i) encrypting CAN messages and hiding system states to protect against selective DoS attacks [159]; (ii) use of authentication schemes (for both ECUs and CAN messages) to ensure their integrity [160]- [166]; (iii) use of asymmetric cryptography and certificates to authenticate ECUs and share symmetric keys [167]. Researchers have also studied the use of behavioral-based intrusion detection systems (IDS) for invehicle networks.…”
Section: Threats To Intra-vehicle Components and Countermeasuresmentioning
confidence: 99%
“…Given the vulnerabilities of the CAN bus [13], [157], [158], a number of mechanisms have been proposed: (i) encrypting CAN messages and hiding system states to protect against selective DoS attacks [159]; (ii) use of authentication schemes (for both ECUs and CAN messages) to ensure their integrity [160]- [166]; (iii) use of asymmetric cryptography and certificates to authenticate ECUs and share symmetric keys [167]. Researchers have also studied the use of behavioral-based intrusion detection systems (IDS) for invehicle networks.…”
Section: Threats To Intra-vehicle Components and Countermeasuresmentioning
confidence: 99%
“…The attacks implemented through the OBD port can be replicated using a malicious node. Palanca et al [11] applied a selective denial-of-service (DoS) attack on an unmodified 2012 Alfa Romeo Giulietta. The research showed that any person who has physical access to the network can disrupt it, even with a simple tool.…”
Section: Physical Access Attacksmentioning
confidence: 99%
“…Therefore, extensive studies have been carried out to find possible solutions [7,8] to the vulnerabilities of CAN. Some of these studies have performed successful experimental attacks on passenger cars [9][10][11][12][13][14] and heavy-duty vehicles [15,16]. At the same time, researchers have also proposed preventative methods for such known attacks.…”
Section: Introductionmentioning
confidence: 99%
“…DoS attack As anticipated in Section II-C, flooding the network with the highest priority frames prevents the ECUs from regularly sending their messages, therefore causing a denial of service. An example of this attack is the work by Palanca et al [17].…”
Section: Attack Scenariosmentioning
confidence: 99%