首页> 外文会议>Communication systems and networks >SIMULATED ATTACKS ON CAN BUSES: VEHICLE VIRUS
【24h】

SIMULATED ATTACKS ON CAN BUSES: VEHICLE VIRUS

机译:CAN总线上的模拟攻击:车辆病毒

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Contemporary vehicles contain a number of electronic controlrnunits (ECUs), which are connected in a network andrnprovide various vehicle functionalities. The firmware onrnthe ECUs need to be kept up-to-date to provide better andrnsafer functionalities. An upcoming trend for automotivernmanufacturers is to create seamless interaction between thernvehicle and fleet management to provide remote diagnosticsrnand firmware updates over the air. To allow this, thernpreviously isolated in-vehicle network must connect to anrnexternal network, and is thus exposed to a whole new rangernof threats, collectively known as cyber attacks. In this paperrnwe have evaluated the ability of the current in-vehiclernnetwork to withstand cyber attacks by simulating a set ofrnplausible attacks targeting the ECUs on the CAN bus. Thernresults show that the network lacks sufficient protectionrnagainst these attacks, and we therefore extensively discussrnthe future security needs for preventing, detecting, counteringrnand recovering from such attacks.
机译:现代车辆包含许多电子控制单元(ECU),它们通过网络连接并提供各种车辆功能。 ECU上的固件需要保持最新状态,以提供更好,更安全的功能。汽车制造商的未来趋势是在汽车和车队管理之间建立无缝的交互,以提供远程诊断和空中固件更新。为此,以前隔离的车载网络必须连接到外部网络,从而面临全新的范围威胁,统称为网络攻击。在本文中,我们通过模拟针对CAN总线上ECU的一组合理的攻击,评估了当前车载网络抵御网络攻击的能力。结果表明,网络对这些攻击缺乏足够的保护,因此,我们广泛讨论了防止,检测,抵抗和从此类攻击中恢复的未来安全需求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号