Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134001
|View full text |Cite
|
Sign up to set email alerts
|

Viden

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 160 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…In the literature, three attack scenarios for in-vehicle networks are documented: suspension, fabrication, and masquerade attacks [8,9,25,26], which are considered in our evaluation. In addition, we introduce and evaluate spectra on an attack of a more stealthy nature, which we refer to as the conquest attack, to highlight the detection capabilities of our approach.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…In the literature, three attack scenarios for in-vehicle networks are documented: suspension, fabrication, and masquerade attacks [8,9,25,26], which are considered in our evaluation. In addition, we introduce and evaluate spectra on an attack of a more stealthy nature, which we refer to as the conquest attack, to highlight the detection capabilities of our approach.…”
Section: Attack Scenariosmentioning
confidence: 99%
“…In practice, however, square-wave signals are characterized by rise and fall times, indicating the time required for a signal to reach its target value. Among others, these are influenced by the capacitances and inductances of the circuits and by the power supply of the ECU respectively the transceiver [10]. The primary voltage source used is a 12 V battery for passenger cars and 24 V for trucks.…”
Section: B Cause Of the Signal Characteristicsmentioning
confidence: 99%
“…The IDS extension Voltage-based attacker identification (Viden) [10] works only on the basis of the voltage level, whose goal is to identify the attacking ECU after an intrusion has been detected by a high-level IDS. The system generates a model based on the average voltage level of dominant bits of the ECUs, collected from multiple frames.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to detecting anomalous behavior, methods to identify which malicious ECU sent a false message in the network have been proposed from 2014 [60]- [62]. Using these techniques, which ECU is compromised or which ECU is illegally installed in the network can be identified and the target ECU can immediately be isolated.…”
Section: Implementing Anomaly Detection In In-vehicle Networkmentioning
confidence: 99%