This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Proposal of HILS-Based In-Vehicle Network Security Verification Environment
Technical Paper
2018-01-0013
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.
Recommended Content
Technical Paper | Security Mechanisms Design for In-Vehicle Network Gateway |
Technical Paper | Security Mechanisms Design of Automotive Gateway Firewall |
Journal Article | Timing Implications of Sharing Resources in Multicore Real-Time Automotive Systems |
Authors
Topic
Citation
Kurachi, R. and Fujikura, T., "Proposal of HILS-Based In-Vehicle Network Security Verification Environment," SAE Technical Paper 2018-01-0013, 2018, https://doi.org/10.4271/2018-01-0013.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
[Unnamed Dataset 1] |
Also In
References
- Miller, C. and Valasek, C. , “Remote Exploitation of an Unaltered Passenger Vehicle,” http://illmatics.com/Remote%20Car%20Hacking.pdf , 2015.
- Wan, J., Canedo, A., and Al Faruque, M.A. , “Security-Aware Functional Modeling of Cyber-Physical Systems,” Emerging Technologies & Factory Automation (ETFA), 2015.
- Wasicek, A., Derler, P., and Lee, E.A. , “Aspect-Oriented Modeling of Attacks in Automotive Cyber-Physical Systems,” DAC’14, 2014.
- Automotive SPICE (Software Process Improvement and Capability dEtermination) , 2017.
- AUTOSAR , https://www.autosar.org/, 2017.
- SystemDesk , https://www.dspace.com/en/inc/home/products/sw/system_architecture_software/systemdesk.cfm, 2017.
- DaVinci Developer , https://vector.com/vi_autosar_tools_en.html, 2017.
- Security Testing Methods , http://standards.sae.org/wip/j3061-2/, 2017.
- Security Testing Tools , http://standards.sae.org/wip/j3061-3/, 2017.
- Bayer, S., Enderle, T., Oka, D.K., and Wolf, M. , Security Crash Test - Practical Security Evaluations of Automotive Onboard IT Components, In “Automotive - Safety & Security 2015,” (Stuttgart, Germany, Apr 21-22, 2015).
- Nishimura, R., Kurachi, R., Ito, K., Miyasaka, T. et al. , “Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM,” 2016 IEEE International Conference on Vehicular Electronics and Safety (ICVES2016), Beijing, Jul 2016, 1-6.
- ControlDesk , https://www.dspace.com/en/inc/home/products/sw/experimentandvisualization/controldesk.cfm, 2017.
- VEOS , https://www.dspace.com/en/inc/home/products/sw/simulation_software/veos.cfm, 2017.
- NuSMV , http://nusmv.fbk.eu/, 2017.
- Bourahla, M. et al. , “Analysis of Real-Time Systems with CTL Model Checkers,” Electronic Notes in Theoretical Computer Science, 2005.