2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC) 2012
DOI: 10.1109/vcsc.2012.6281235
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy for in-vehicle networks

Abstract: Mobile devices such as smartphones have gained more and more attention from security researchers and malware authors, the latter frequently attacking those platforms and stealing personal information. Vehicle on-board networks, in particular infotainment systems, are increasingly connected with such mobile devices and the internet and will soon make it possible to load and install third party applications. This makes them susceptible to new attacks similar to those which plague mobile phones and personal compu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…To that goal, they used the vehicle infotainment system to access the ECU that sends legitimate commands to other ECU components. To cope with such attacks, Schweppe and Roudier presented an architecture capable of monitoring data flow through the car's CAN. This approach enhances vehicle security by using taint tracking tools along with a security framework able to dynamically tag data flows within or among control units.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To that goal, they used the vehicle infotainment system to access the ECU that sends legitimate commands to other ECU components. To cope with such attacks, Schweppe and Roudier presented an architecture capable of monitoring data flow through the car's CAN. This approach enhances vehicle security by using taint tracking tools along with a security framework able to dynamically tag data flows within or among control units.…”
Section: Related Workmentioning
confidence: 99%
“…Various techniques to mitigate the security risks of the infotainment and OBD systems have been proposed . However, the security of the modern automotive infotainment systems can be still greatly compromised by interfering with Bluetooth, Wi‐Fi, and telematics signals .…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, anomaly detection has also been considered for in-vehicle security. The work in [46] introduces a binary instrumentation technique to mark and track data for anomaly detection. The work in [31] introduces an entropy concept for CAN and uses deviations of entropy to detect anomalies.…”
Section: Intra-vehicle Securitymentioning
confidence: 99%
“…Plus, using highly optimized special circuitry instead of costly general purpose hardware makes it possible to reduce the security cost. In other studies, one research equipped "taint tracking tools" in a security framework for the conventional automobile communications system [16]. By observing the data flow in the control units with an architecture introducing data flow tracking, data could only be used for their intended purpose in applications, and the data could be monitored by ECUs when the code was executed.…”
Section: Related Workmentioning
confidence: 99%