Proceedings Third International Workshop on Automotive and Autonomous Vehicle Security 2021
DOI: 10.14722/autosec.2021.23002
|View full text |Cite
|
Sign up to set email alerts
|

WeepingCAN: A Stealthy CAN Bus-off Attack

Abstract: The controller area network (CAN) is a high-value asset to defend and attack in automobiles. The bus-off attack exploits CAN's fault confinement to force a victim electronic control unit (ECU) into the bus-off state, which prevents it from using the bus. Although pernicious, the bus-off attack has two distinct phases that are observable on the bus and allow the attack to be detected and prevented. In this paper we present Weeping-CAN, a refinement of the bus-off attack that is stealthy and can escape detection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…Cho and Shin [13] present the bus-off attack, which exploits the error-handling mechanism of the CAN bus to shut down victim ECUs. Bloom [7] present Weeping-CAN, a refinement of the bus-off attack that is more stealthy and can evade detection. Kulandaivel et al [30] present CANnon, which leverages the peripheral clock gating feature to insert arbitrary bits at any time instance.…”
Section: Discussionmentioning
confidence: 99%
“…Cho and Shin [13] present the bus-off attack, which exploits the error-handling mechanism of the CAN bus to shut down victim ECUs. Bloom [7] present Weeping-CAN, a refinement of the bus-off attack that is more stealthy and can evade detection. Kulandaivel et al [30] present CANnon, which leverages the peripheral clock gating feature to insert arbitrary bits at any time instance.…”
Section: Discussionmentioning
confidence: 99%
“…Frequency/Timing-Based: Regards the timing or sequencing of arbitration IDs [17,[19][20][21][22][23] Payload-Based: Considers the data frame (message contents) as a string of bits, without explicitly recovering the signals these bits represent [16,[24][25][26][27][28][29][30] Signal-Based: Requires first decoding raw data field bits into constituent signals, and uses time series' of signal values as inputs [5,17,[31][32][33][34][35][36][37] Physical Side-Channel: Uses physical layer attributes (e.g., voltage) [15,[38][39][40] Other: Includes works that do not fall into the above categories (e.g., using rules to guarantee specific characteristics of the CAN messages are followed [41,42]).…”
Section: The Growth and State Of Can Ids Researchmentioning
confidence: 99%
“…In another example, Cho and Shin cleverly use a strongly compromised ECU in order to weakly compromise a target ECU by causing it to go into bus off mode, at which point they run a masquerade attack [8]. Notably, a very recent paper of Bloom [30] provides stealthier techniques for exhibiting this attack. Interestingly, if an attacker is not careful when mounting a fabrication attack, this same mechanism can result in the attacker's own strongly compromised ECU getting bussed off.…”
Section: Masquerade Attacksmentioning
confidence: 99%
“…Since the voltage profile changes with the environment and operating conditions (e.g., temperature and supply voltage), the machine learning model must get updated and retrained periodically. VIDS is effective against a single-actor based denial of service or spoofing attacks that opt to force the victim into the bus-off mode [34].…”
Section: Related Workmentioning
confidence: 99%