Proposal of HILS-Based In-Vehicle Network Security Verification Environment

2018-01-0013

04/03/2018

Features
Event
WCX World Congress Experience
Authors Abstract
Content
We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.
Meta TagsDetails
DOI
https://doi.org/10.4271/2018-01-0013
Pages
8
Citation
Kurachi, R., and Fujikura, T., "Proposal of HILS-Based In-Vehicle Network Security Verification Environment," SAE Technical Paper 2018-01-0013, 2018, https://doi.org/10.4271/2018-01-0013.
Additional Details
Publisher
Published
Apr 3, 2018
Product Code
2018-01-0013
Content Type
Technical Paper
Language
English