Proceedings of the ACM Workshop on Cyber-Physical Systems Security &Amp; Privacy - CPS-SPC'19 2019
DOI: 10.1145/3338499.3357362
|View full text |Cite
|
Sign up to set email alerts
|

CopyCAN

Abstract: In the last years, the automotive industry has incorporated more and more electronic components in vehicles, leading to complex on-board networks of Electronic Control Units (ECUs) that communicate with each other to control all vehicle functions, making it safer and easier to drive. This communication often relies on Controller Area Network (CAN), a bus communication protocol that defines a standard for real-time reliable and efficient transmission. However, CAN does not provide any security measure against c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Therefore, an attacker that takes control of an ECU that has access to a CAN bus can ideally send any ID and payload. In worst-case scenarios, the attacker is also capable of silencing the owner of the packet to avoid conflicts, as presented in [25]. In brief, an attacker may affect the payload and flow of packets on the bus.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Therefore, an attacker that takes control of an ECU that has access to a CAN bus can ideally send any ID and payload. In worst-case scenarios, the attacker is also capable of silencing the owner of the packet to avoid conflicts, as presented in [25]. In brief, an attacker may affect the payload and flow of packets on the bus.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Consequently, they can detect a wide range of attacks but usually have high computational requirements and are not as effective against frequency-based attacks. Considering attacks to CAN, flow-based approaches cannot be used as a standalone solution since an adversary in a compromised system can send malicious packets without changing their frequency by forcing the transmitting ECU in the bus-off state before communicating [4,5]. On the other hand, payload-based approaches may not be suited for real-time detection of the entire traffic of the network.…”
Section: Introductionmentioning
confidence: 99%