Towards a Security Architecture for Protecting Connected Vehicles from Malware

被引:18
作者
Iqbal, Shahrear [1 ]
Haque, Anwar [2 ]
Zulkernine, Mohammad [3 ]
机构
[1] SecurityCompass, Toronto, ON, Canada
[2] Western Univ, Dept Comp Sci, London, ON, Canada
[3] Queens Univ, Sch Comp, Kingston, ON, Canada
来源
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Connected vehicle security; Vehicle malware; Malware analysis and detection;
D O I
10.1109/vtcspring.2019.8746516
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
Vehicles are becoming increasingly connected to the outside world. We can connect our devices to the vehicle's infotainment system and internet is being added as a functionality. Therefore, security is a major concern as the attack surface has become much larger than before. Consequently, attackers are creating malware that can infect vehicles and perform life-threatening activities. For example, a malware can compromise vehicle ECUs and cause unexpected consequences. Hence, ensuring the security of connected vehicle software and networks is extremely important to gain consumer confidence and foster the growth of this emerging market. In this paper, we propose a characterization of vehicle malware and a security architecture to protect vehicle from these malware. The architecture uses multiple computational platforms and makes use of the virtualization technique to limit the attack surface. There is a real-time operating system to control critical vehicle functionalities and multiple other operating systems for non-critical functionalities (infotainment, telematics, etc.). The security architecture also describes groups of components for the operating systems to prevent malicious activities and perform policing (monitor, detect, and control). We believe this work will help automakers guard their systems against malware and provide a clear guideline for future research.
引用
收藏
页数:5
相关论文
共 18 条
[1]  
Bécsi T, 2015, 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), P477, DOI 10.1109/MTITS.2015.7223297
[2]  
ben Othmane L, 2013, IEEE INT C INTELL TR, P652, DOI 10.1109/ITSC.2013.6728305
[3]  
Checkoway S., 2011, P 20 USENIX C SEC SE, P6
[4]   DRIVING WITH SHARKS Rethinking Connected Vehicles with Vehicle Cybersecurity [J].
Eiza, Mahmoud Hashem ;
Ni, Qiang .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2017, 12 (02) :45-51
[5]   Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures [J].
Hoppe, Tobias ;
Kiltz, Stefan ;
Dittmann, Jana .
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 :235-248
[6]   Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security [J].
Kang, Min-Joo ;
Kang, Je-Won .
PLOS ONE, 2016, 11 (06)
[7]  
Kleberger P, 2011, IEEE INT VEH SYM, P528, DOI 10.1109/IVS.2011.5940525
[8]  
Larson UE, 2008, IEEE INT VEH SYM, P830
[9]   Connected Vehicles: Solutions and Challenges [J].
Lu, Ning ;
Cheng, Nan ;
Zhang, Ning ;
Shen, Xuemin ;
Mark, Jon W. .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04) :289-299
[10]  
Mazloom S., 2016, P 10 USENIX WORKSHOP