Buscemi et al., 2023 - Google Patents
A survey on controller area network reverse engineeringBuscemi et al., 2023
View PDF- Document ID
- 8414494852256483177
- Author
- Buscemi A
- Turcanu I
- Castignani G
- Panchenko A
- Engel T
- Shin K
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/08—Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
- G07C5/0841—Registering performance data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Buscemi et al. | A survey on controller area network reverse engineering | |
Marchetti et al. | READ: Reverse engineering of automotive data frames | |
Sommer et al. | Survey and classification of automotive security attacks | |
Pesé et al. | LibreCAN: Automated CAN message translator | |
Aliwa et al. | Cyberattacks and countermeasures for in-vehicle networks | |
Strandberg et al. | A systematic literature review on automotive digital forensics: Challenges, technical solutions and data collection | |
Jedh et al. | Detection of message injection attacks onto the can bus using similarities of successive messages-sequence graphs | |
Verma et al. | Addressing the lack of comparability & testing in can intrusion detection research: A comprehensive guide to can ids data & introduction of the road dataset | |
Zhang et al. | A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks | |
ben Othmane et al. | On the performance of detecting injection of fabricated messages into the can bus | |
Xie et al. | Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: state‐of‐the‐art and future challenges | |
Frassinelli et al. | I know where you parked last summer: Automated reverse engineering and privacy analysis of modern cars | |
Schmidt et al. | Adapted development process for security in networked automotive systems | |
WO2020208639A2 (en) | A system and method for detection of anomalous controller area network (can) messages | |
Grimm et al. | Context-aware security for vehicles and fleets: A survey | |
WO2020068826A1 (en) | Electronic controller security system | |
D’Angelo et al. | An association rules-based approach for anomaly detection on CAN-bus | |
Fenzl et al. | Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models | |
Chevalier et al. | Ecu-secure: Characteristic functions for in-vehicle intrusion detection | |
Buscemi et al. | A data-driven minimal approach for CAN bus reverse engineering | |
Lampe et al. | can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection | |
Tomlinson et al. | Using internal context to detect automotive controller area network attacks | |
Laufenberg et al. | Static analysis of controller area network communication for attack detection | |
Vahidi et al. | Systematic evaluation of automotive intrusion detection datasets | |
US20230275877A1 (en) | Visual sensor validation system |