This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Proposal of HILS-Based In-Vehicle Network Security Verification Environment
Technical Paper
2018-01-0013
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.
Recommended Content
Technical Paper | Security Mechanisms Design for In-Vehicle Network Gateway |
Technical Paper | Security Mechanisms Design of Automotive Gateway Firewall |
Journal Article | Timing Implications of Sharing Resources in Multicore Real-Time Automotive Systems |
Authors
Topic
Citation
Kurachi, R. and Fujikura, T., "Proposal of HILS-Based In-Vehicle Network Security Verification Environment," SAE Technical Paper 2018-01-0013, 2018, https://doi.org/10.4271/2018-01-0013.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 |
Also In
References
- Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle http://illmatics.com/Remote%20Car%20Hacking.pdf 2015
- Wan , J. , Canedo , A. , and Al Faruque , M.A. Emerging Technologies & Factory Automation (ETFA) 2015
- Wasicek , A. , Derler , P. , and Lee , E.A. Aspect-Oriented Modeling of Attacks in Automotive Cyber-Physical Systems DAC’14 2014
- Automotive SPICE (Software Process Improvement and Capability dEtermination) 2017
- AUTOSAR https://www.autosar.org 2017
- SystemDesk https://www.dspace.com/en/inc/home/products/sw/system_architecture_software/systemdesk.cfm 2017
- DaVinci Developer https://vector.com/vi_autosar_tools_en.html 2017
- Security Testing Methods http://standards.sae.org/wip/j3061-2/ 2017
- Security Testing Tools http://standards.sae.org/wip/j3061-3/ 2017
- Bayer , S. , Enderle , T. , Oka , D.K. , and Wolf , M. Security Crash Test - Practical Security Evaluations of Automotive Onboard IT Components Automotive - Safety & Security 2015 Stuttgart, Germany 2015
- Nishimura , R. , Kurachi , R. , Ito , K. , Miyasaka , T. et al. Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM 2016 IEEE International Conference on Vehicular Electronics and Safety (ICVES2016) Beijing 2016 1 6
- ControlDesk https://www.dspace.com/en/inc/home/products/sw/experimentandvisualization/controldesk.cfm 2017
- VEOS https://www.dspace.com/en/inc/home/products/sw/simulation_software/veos.cfm 2017
- NuSMV http://nusmv.fbk.eu 2017
- Bourahla , M. et al. Electronic Notes in Theoretical Computer Science 2005