Visible to the public Error Handling of In-vehicle Networks Makes Them Vulnerable

TitleError Handling of In-vehicle Networks Makes Them Vulnerable
Publication TypeConference Paper
Year of Publication2016
AuthorsCho, Kyong-Tak, Shin, Kang G.
Conference NameProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4139-4
Keywordsautomotive cybersecurity, controller area network security, controller area networks, denial-of-service attack, error handling, Internet of Things, Internet of Things (IoT), pubcrawl, Resiliency
Abstract

Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Control Area Network (CAN), the de facto standard in-vehicle network protocol. Specifically, we propose a new type of Denial-of-Service (DoS), called the bus-off attack, which exploits the error-handling scheme of in-vehicle networks to disconnect or shut down good/uncompromised ECUs. This is an important attack that must be thwarted, since the attack, once an ECU is compromised, is easy to be mounted on safety-critical ECUs while its prevention is very difficult. In addition to the discovery of this new vulnerability, we analyze its feasibility using actual in-vehicle network traffic, and demonstrate the attack on a CAN bus prototype as well as on two real vehicles. Based on our analysis and experimental results, we also propose and evaluate a mechanism to detect and prevent the bus-off attack.

URLhttp://doi.acm.org/10.1145/2976749.2978302
DOI10.1145/2976749.2978302
Citation Keycho_error_2016