首页> 外文会议>International conference on smart computing and communication >Static Analysis of Android Apps Interaction with Automotive CAN
【24h】

Static Analysis of Android Apps Interaction with Automotive CAN

机译:Android Apps与汽车CAN交互的静态分析

获取原文

摘要

Modern car infotainment systems allow users to connect an Android device to the vehicle. The device then interacts with the hardware of the car, hence providing new interaction mechanisms to the driver. However, this can be misused and become a major security breach into the car, with subsequent security concerns: the Android device can both read sensitive data (speed, model, airbag status) and send dangerous commands (brake, lock, airbag explosion). Moreover, this scenario is unsettling since Android devices connect to the cloud, opening the door to remote attacks by malicious users or the cyberspace. The OpenXC platform is an open-source API that allows Android apps to interact with the car's hardware. This article studies this library and shows how it can be used to create injection attacks. Moreover, it introduces a novel static analysis that identifies such attacks before they actually occur. It has been implemented in the Julia static analyzer and finds injection vulnerabilities in actual apps from the Google Play marketplace.
机译:现代汽车信息娱乐系统允许用户将Android设备连接至车辆。然后,该设备与汽车的硬件进行交互,从而为驾驶员提供新的交互机制。但是,这可能会被滥用,并成为汽车上的主要安全漏洞,随之而来的是安全隐患:Android设备既可以读取敏感数据(速度,型号,安全气囊状态),又可以发送危险命令(刹车,锁定,安全气囊爆炸)。此外,这种情况令人不安,因为Android设备已连接到云,这为恶意用户或网络空间进行远程攻击打开了大门。 OpenXC平台是一个开放源代码API,允许Android应用与汽车硬件进行交互。本文研究了该库,并说明了如何将其用于创建注入攻击。此外,它引入了一种新颖的静态分析,可以在此类攻击实际发生之前对其进行识别。它已在Julia静态分析器中实现,可从Google Play市场中的实际应用中发现注入漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号