Error Handling of In-vehicle Networks Makes Them Vulnerable

被引:162
作者
Cho, Kyong-Tak [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
D O I
10.1145/2976749.2978302
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Control Area Network ( CAN), the de facto standard in-vehicle network protocol. Specifically, we propose a new type of Denial-of-Service (DoS), called the bus-off attack, which exploits the error-handling scheme of in-vehicle networks to disconnect or shut down good/uncompromised ECUs. This is an important attack that must be thwarted, since the attack, once an ECU is compromised, is easy to be mounted on safety-critical ECUs while its prevention is very difficult. In addition to the discovery of this new vulnerability, we analyze its feasibility using actual in-vehicle network traffic, and demonstrate the attack on a CAN bus prototype as well as on two real vehicles. Based on our analysis and experimental results, we also propose and evaluate a mechanism to detect and prevent the bus-off attack.
引用
收藏
页码:1044 / 1055
页数:12
相关论文
共 20 条
[1]  
Checkoway Stephen., 2011, SEC'11
[2]  
Davis R., 2011, ECRTS
[3]  
Foster I.D., 2015, WOOT
[4]  
Hoppe Tobias, 2011, RELIABILITY ENG SYST
[5]  
Hu T, 2015, THESIS
[6]  
Koscher K., 2010, IEEE S P
[7]  
Leen G., 2002, ELSEVIER MICROPROCES
[8]  
Miller C., 2013, Defcon 21
[9]  
Miller C., 2015, BLACK HAT US
[10]  
Muter M., 2011, IEEE IVS