Fingerprinting electronic control units for vehicle intrusion detection

KT Cho, KG Shin - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
As more software modules and external interfaces are getting added on vehicles, new
attacks and vulnerabilities are emerging. Researchers have demonstrated how to …

Error handling of in-vehicle networks makes them vulnerable

KT Cho, KG Shin - Proceedings of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Contemporary vehicles are getting equipped with an increasing number of Electronic
Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle …

Cloaking the clock: Emulating clock skew in controller area networks

SU Sagong, X Ying, A Clark, L Bushnell… - 2018 ACM/IEEE 9th …, 2018 - ieeexplore.ieee.org
Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-
vehicle network protocol standards such as the Controller Area Network (CAN). These …

Shape of the cloak: Formal analysis of clock skew-based intrusion detection system in controller area networks

X Ying, SU Sagong, A Clark, L Bushnell… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
This paper presents a new masquerade attack called the cloaking attack and provides
formal analyses for clock skew-based intrusion detection systems (IDSs) that detect …

Validation of event data recorders in high severity full-frontal crash tests

A Tsoi, J Hinch, R Ruth, H Gabler - SAE International Journal of …, 2013 - JSTOR
This study evaluates the accuracy of 41 Event Data Recorders (EDR) extracted from model
year 2012 General Motors, Chrysler, Ford, Honda, Mazda, Toyota, and Volvo vehicles …

Intrusion detection system using SOEKS and deep learning for in-vehicle security

L Gao, F Li, X Xu, Y Liu - Cluster Computing, 2019 - Springer
With the continuous development of the intelligent vehicle, vehicle security events occur
frequently, therefore, the vehicle information security is particularly important. In this paper …

Aiden: Association-learning-based attack identification on the edge of V2X communication networks

Y Chen, M Alam, S Mumtaz - IEEE Transactions on Green …, 2022 - ieeexplore.ieee.org
In vehicle security, attack identification has been proposed to identify the compromised
electronic control units (ECUs) of a vehicle. Fingerprinting methods using a variety of …

Exploiting temperature-varied ECU fingerprints for source identification in in-vehicle network intrusion detection

M Tian, R Jiang, C Xing, H Qu, Q Lu… - 2019 IEEE 38th …, 2019 - ieeexplore.ieee.org
The in-vehicle controller area network (CAN) provides reliable communications among
ECUs, whereas the lack of security design of CAN protocols makes it vulnerable to CAN …

Static analysis of controller area network communication for attack detection

J Laufenberg, T Kropf, O Bringmann - European Journal for Security …, 2021 - Springer
The vulnerability of modern cars increases due to their multiple connections to the
environment, which offers the possibility of remote attacks in the worst case with fatal …

Advanced Temperature‐Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks

M Tian, R Jiang, H Qu, Q Lu… - Security and …, 2020 - Wiley Online Library
External wireless interfaces and the lack of security design of controller area network (CAN)
standards make it vulnerable to CAN‐targeting attacks. Unfortunately, various defense …