首页> 外文会议>2016 IEEE International Carnahan Conference on Security Technology >Techniques in hacking and simulating a modem automotive controller area network
【24h】

Techniques in hacking and simulating a modem automotive controller area network

机译:破解和模拟现代汽车控制器局域网的技术

获取原文
获取原文并翻译 | 示例

摘要

This research will demonstrate hacking techniques on the modern automotive network and describe the design and implementation of a benchtop simulator. In currently-produced vehicles, the primary network is based on the Controller Area Network (CAN) bus described in the ISO 11898 family of protocols. The CAN bus performs well in the electronically noisy environment found in the modern automobile. While the CAN bus is ideal for the exchange of information in this environment, when the protocol was designed security was not a priority due to the presumed isolation of the network. That assumption has been invalidated by recent, well-publicized attacks where hackers were able to remotely control an automobile, leading to a product recall that affected more than a million vehicles. The automobile has a multitude of electronic control units (ECUs) which are interconnected with the CAN bus to control the various systems which include the infotainment, light, and engine systems. The CAN bus allows the ECUs to share information along a common bus which has led to improvements in fuel and emission efficiency, but has also introduced vulnerabilities by giving access on the same network to cyber-physical systems (CPS). These CPS systems include the anti-lock braking systems (ABS) and on late model vehicles the ability to turn the steering wheel and control the accelerator. Testing functionality on an operational vehicle can be dangerous and place others in harm's way, but simulating the vehicle network and functionality of the ECUs on a bench-top system provides a safe way to test for vulnerabilities and to test possible security solutions to prevent CPS access over the CAN bus network. This paper will describe current research on the automotive network, provide techniques in capturing network traffic for playback, and demonstrate the design and implementation of a benchtop system for continued research on the CAN bus.
机译:这项研究将演示现代汽车网络上的黑客技术,并描述台式模拟器的设计和实现。在当前生产的车辆中,主要网络基于ISO 11898协议系列中描述的控制器局域网(CAN)总线。 CAN总线在现代汽车中存在电子噪声的环境中表现良好。尽管CAN总线是在这种环境下进行信息交换的理想选择,但在设计协议时,由于假定的网络隔离性,安全性并不是一个优先事项。这种假设已因最近广为人知的攻击而无效,在这种攻击中,黑客能够远程控制汽车,从而导致影响超过一百万辆汽车的产品召回。汽车具有与CAN总线互连的多个电子控制单元(ECU),以控制各种系统,包括信息娱乐,照明和引擎系统。 CAN总线使ECU可以沿着一条公共总线共享信息,这不仅改善了燃油和排放效率,而且还通过在同一网络上访问网络物理系统(CPS)提供了漏洞。这些CPS系统包括防抱死制动系统(ABS),在较新型号的车辆上,它们还可以旋转方向盘和控制油门。在运行中的车辆上测试功能可能很危险,并可能危害其他人,但是在台式系统上模拟车辆网络和ECU的功能可提供一种安全的方法来测试漏洞并测试可能的安全解决方案,以防止CPS访问通过CAN总线网络。本文将介绍当前在汽车网络上的研究,提供捕获网络流量以进行回放的技术,并演示用于继续研究CAN总线的台式系统的设计和实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号