TTIDS: Transmission-resuming time-based intrusion detection system for controller area network (CAN)

S Lee, HJ Jo, A Cho, DH Lee, W Choi - IEEE Access, 2022 - ieeexplore.ieee.org
Modern vehicles are becoming complex cyber-physical systems equipped with numerous
electronic control units (ECUs). Over the controller area network (CAN), these ECUs …

Exposing new vulnerabilities of error handling mechanism in {CAN}

K Serag, R Bhatia, V Kumar, ZB Celik… - 30th USENIX Security …, 2021 - usenix.org
Controller Area Network (CAN) has established itself as the main internal communication
medium for vehicles. However, recent works have shown that error handling makes CAN …

Real Time Perfect Bit Modification Attack on In-Vehicle CAN

Y Lee, YE Kim, JG Chung, S Woo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The vulnerabilities of controller area network (CAN) are often targeted by various types of
vehicle hacking. To this end, conventional cyber attacks have used a frame injection and a …

{CANARY}-a reactive defense mechanism for Controller Area Networks based on Active {RelaYs}

B Groza, L Popa, PS Murvay, Y Elovici… - 30th USENIX Security …, 2021 - usenix.org
We are rethinking the decades-old design of the CAN bus by incorporating reactive defense
capabilities in it. While its reliability and cost effectiveness turned CAN into the most widely …

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

A Humayed, F Li, J Lin, B Luo - … 25th European Symposium on Research in …, 2020 - Springer
Abstract The Controller Area Network (CAN) has been widely adopted as the de facto
standard to support the communication between the ECUs and other computing …

Intrusion detection for controller area network using support vector machines

V Tanksale - 2019 IEEE 16th international conference on …, 2019 - ieeexplore.ieee.org
Controller Area Network is the most widely adopted communication standard in
automobiles. The CAN protocol is robust and is designed to minimize overhead. The light …

Applying security testing techniques to automotive engineering

I Pekaric, C Sauerwein, M Felderer - Proceedings of the 14th …, 2019 - dl.acm.org
Over the past few decades, the automotive industry was mostly focused on testing the safety
aspects of a vehicle. However, this was not the case with security testing as it only began to …

CANTO-covert authentication with timing channels over optimized traffic flows for CAN

B Groza, L Popa, PS Murvay - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Previous research works have endorsed the use of delays and clock skews for detecting
intrusions or fingerprinting controllers that communicate on the CAN bus. Recently, timing …

Practical security exploits of the FlexRay in-vehicle communication protocol

PS Murvay, B Groza - Risks and Security of Internet and Systems: 13th …, 2019 - Springer
The ever increasing number of electronic control units inside a car demanded more complex
buses with higher bandwidth capacities. But even the more recently designed in-vehicle …

A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols

A Lotto, F Marchiori, A Brighente, M Conti - arXiv preprint arXiv …, 2024 - arxiv.org
The large number of Electronic Control Units (ECUs) mounted on modern cars and their
expansive communication capabilities create a substantial attack surface for potential …