Nothing Special   »   [go: up one dir, main page]

Buscemi et al., 2023 - Google Patents

A survey on controller area network reverse engineering

Buscemi et al., 2023

View PDF
Document ID
8414494852256483177
Author
Buscemi A
Turcanu I
Castignani G
Panchenko A
Engel T
Shin K
Publication year
Publication venue
IEEE Communications Surveys & Tutorials

External Links

Snippet

Controller Area Network (CAN) is a masterless serial bus designed and widely used for the exchange of mission and time-critical information within commercial vehicles. In-vehicle communication is based on messages sent and received by Electronic Control Units (ECUs) …
Continue reading at rtcl.eecs.umich.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Buscemi et al. A survey on controller area network reverse engineering
Marchetti et al. READ: Reverse engineering of automotive data frames
Sommer et al. Survey and classification of automotive security attacks
Pesé et al. LibreCAN: Automated CAN message translator
Aliwa et al. Cyberattacks and countermeasures for in-vehicle networks
Strandberg et al. A systematic literature review on automotive digital forensics: Challenges, technical solutions and data collection
Jedh et al. Detection of message injection attacks onto the can bus using similarities of successive messages-sequence graphs
Verma et al. Addressing the lack of comparability & testing in can intrusion detection research: A comprehensive guide to can ids data & introduction of the road dataset
Zhang et al. A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks
ben Othmane et al. On the performance of detecting injection of fabricated messages into the can bus
Xie et al. Cybersecurity protection on in‐vehicle networks for distributed automotive cyber‐physical systems: state‐of‐the‐art and future challenges
Frassinelli et al. I know where you parked last summer: Automated reverse engineering and privacy analysis of modern cars
Schmidt et al. Adapted development process for security in networked automotive systems
WO2020208639A2 (en) A system and method for detection of anomalous controller area network (can) messages
Grimm et al. Context-aware security for vehicles and fleets: A survey
WO2020068826A1 (en) Electronic controller security system
D’Angelo et al. An association rules-based approach for anomaly detection on CAN-bus
Fenzl et al. Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Chevalier et al. Ecu-secure: Characteristic functions for in-vehicle intrusion detection
Buscemi et al. A data-driven minimal approach for CAN bus reverse engineering
Lampe et al. can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection
Tomlinson et al. Using internal context to detect automotive controller area network attacks
Laufenberg et al. Static analysis of controller area network communication for attack detection
Vahidi et al. Systematic evaluation of automotive intrusion detection datasets
US20230275877A1 (en) Visual sensor validation system