2019 15th International Computer Engineering Conference (ICENCO) 2019
DOI: 10.1109/icenco48310.2019.9027298
|View full text |Cite
|
Sign up to set email alerts
|

ECU Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-vehicle Security against Spoofing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Recent studies also suggest that adversarial examples can be employed to confuse autonomous vehicles by manipulating traffic signs or altering the segment of pedestrians in an object detection system (Xie et al, 2017). Several types of attacks are topics of extensive discussion in literature (Assion et al, 2019; Hafeez et al, 2019; Qayyum et al, 2020; Ren et al, 2020a, 2020b; Sadeghi et al, 2020; Sharma et al, 2019). Several adversarial examples generating methods will be discussed in the next subsection.…”
Section: Machine Learning For Cavs Cybersecuritymentioning
confidence: 99%
“…Recent studies also suggest that adversarial examples can be employed to confuse autonomous vehicles by manipulating traffic signs or altering the segment of pedestrians in an object detection system (Xie et al, 2017). Several types of attacks are topics of extensive discussion in literature (Assion et al, 2019; Hafeez et al, 2019; Qayyum et al, 2020; Ren et al, 2020a, 2020b; Sadeghi et al, 2020; Sharma et al, 2019). Several adversarial examples generating methods will be discussed in the next subsection.…”
Section: Machine Learning For Cavs Cybersecuritymentioning
confidence: 99%
“…However, this method does not give the specific interaction process of the protocol, nor does it verify the feasibility of its scheme. Reference [10] uses a neural network method to authenticate messages on the vehicle network, such as the traditional CAN protocol. The author claims that it can effectively improve the accuracy of electronic control unit (ECU) transmission and finally gives analysis and verification, but there was no analysis to assess safety.…”
Section: Related Workmentioning
confidence: 99%
“…Attacks on CAN disrupt the communication between ECUs and the ADAS units to initiate false actuation signals. In [180] a neural network-based model is proposed to authenticate electronic messages sent by ECU through CAN to ensure confidentiality and integrity. It exploits the unique transient response parameters of the CAN channel imposed in ECU signals to generate features that can then differentiate individual ECUs.…”
Section: Resilient Operation Of Self-driving Cars Under Cyber-attacksmentioning
confidence: 99%