DoS attacks on controller area networks by fault injections from the software layer

PS Murvay, B Groza - Proceedings of the 12th International Conference …, 2017 - dl.acm.org
Proceedings of the 12th International Conference on Availability …, 2017dl.acm.org
The Controller Area Network (CAN) is still the most widely employed bus in the automotive
sector. Its lack of security mechanisms led to a high number of attacks and consequently
several security countermeasures were proposed, ie, authentication protocols or intrusion
detection mechanisms. We discuss vulnerabilities of the CAN data link layer that can be
triggered from the application level with the use of an off the shelf CAN transceiver. Namely,
due to the wired-AND design of the CAN bus, dominant bits will always overwrite recessive …
The Controller Area Network (CAN) is still the most widely employed bus in the automotive sector. Its lack of security mechanisms led to a high number of attacks and consequently several security countermeasures were proposed, i.e., authentication protocols or intrusion detection mechanisms. We discuss vulnerabilities of the CAN data link layer that can be triggered from the application level with the use of an off the shelf CAN transceiver. Namely, due to the wired-AND design of the CAN bus, dominant bits will always overwrite recessive ones, a functionality normally used to assure priority for frames with low value identifiers. We exploit this characteristic and show Denial of Service attacks both on senders and receivers based on bit injections by using bit banging to maliciously control the CAN transceiver. We demonstrate the effects and limitations of such attacks through experimental analysis and discuss possible countermeasures. In particular, these attacks may have high impact on centralized authentication mechanisms that were frequently proposed in the literature since these attacks can place monitoring nodes in a bus-off state for certain periods of time.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果