Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability

被引:14
作者
Josephlal, Edwin Franco Myloth [1 ]
Adepu, Sridhar [1 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Ctr Res Cyber Secur, Singapore, Singapore
来源
201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019) | 2019年
基金
新加坡国家研究基金会;
关键词
Automotive infotainment system; Critical Infrastructure; Cyber Physical Systems; automobile security; Industrial Control System; cyber attacks; cyber-physical attacks; Android; Nmap; Nessus; Metasploit;
D O I
10.1109/HASE.2019.00044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Automobiles of the current era are heavily computerized which makes them highly susceptible to attacks that were unheard of with traditional automobiles. In the past with traditional automobiles, one would require physical access to the automobile to compromise it. Today however, computerization has allowed remote accessibility of automobiles. Remote compromise is feasible by utilizing a vast range of attack vectors such as mechanics tools, automotive infotainment system, Bluetooth and cellular radios etc. In addition, wireless communication channels have made it possible to have long distance vehicle control, location tracking, in-cabin audio ex filtration etc. One of the electronic components in a modern automobile is its automotive infotainment system. This paper focuses on identifying the vulnerabilities of the automotive infotainment system with respect to its WIFI capabilities by conducting structured vulnerability tests on the WIFI capabilities of an automotive infotainment system. To do this, we analysed the WIFI attack surface and constructed test environments and used appropriate tools such as (Nmap (open port scan), Nessus (vulnerability scan), Metasploit) to generate a penetration testing plan to search for vulnerabilities. The vulnerability findings are well documented in this paper.
引用
收藏
页码:241 / 246
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2011, P 20 USENIX SEC S
[2]  
[Anonymous], 2015, WIRED
[3]  
Bird J., 2015, OWASP ATTACK SURFACE
[4]  
Bordonali C., 2017, Shifting gears in cyber security for connected cars
[5]  
Computest, 2018, RES PAP CONN CARW GE
[6]  
Garzon S. R., 2012, Proceedings of the Eighth International Conference on Intelligent Environments (IE 2012), P315, DOI 10.1109/IE.2012.70
[7]  
Hasan M., 2010, ARXIV10063848
[8]  
Jain J., 2018, HACKING ANDROID DEVI
[9]  
Joshi D., 2017, Int. Res. J. Eng. Technol, V4, P1666
[10]  
Klosowski T., 2016, USE NESSUS SCAN NETW