2019
DOI: 10.1155/2019/5650245
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Android App-Repackaging Attack on In-Vehicle Network

Abstract: The convergence of automobiles and ICT (information and communication technology) has become a new paradigm for the development of next-generation vehicles. In particular, connected cars represent the most in-demand automobile-ICT convergence technology. With the development of 5G technology, communication between vehicle and external device using autonomous driving and Internet of things (IoT) technology has been remarkably developed. Control of vehicles using smart phones has become a routine feature, and ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 12 publications
(15 reference statements)
0
12
0
Order By: Relevance
“…Since the measurement is not a one-time, but a longterm process, two measures need to be taken in practice. (1) To prevent the service from being recycled, we use the Android foreground service to keep monitoring the application. e foreground service is hard to be killed by the system when the system memory is insufficient.…”
Section: Trusted Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the measurement is not a one-time, but a longterm process, two measures need to be taken in practice. (1) To prevent the service from being recycled, we use the Android foreground service to keep monitoring the application. e foreground service is hard to be killed by the system when the system memory is insufficient.…”
Section: Trusted Applicationsmentioning
confidence: 99%
“…Mobile devices serve as the main IoT control center and the communication portal for mobile edge computing. Especially, existing works reveal that Android devices face many practical risks [1][2][3]. For example, in the scene of the Internet of Vehicles, if the vehicle control application of the Android device is tampered with, the vehicle will become unavailable and the privacy information may also be leaked.…”
Section: Introductionmentioning
confidence: 99%
“…Because CAN was designed only for closed network environments, it does not provide basic information protection features (e.g., confidentiality, authentication, and access control) [9]. There is the need to put into place added layers of security to avoid malicious usage of wireless ELM 327 devices.…”
Section: Additional Measuresmentioning
confidence: 99%
“…The absence of added security to the functionality of wireless OBD II readers has led to reported cases of malicious access to key vehicle functionality and could lead to possible cases of theft of physical belongings as well as user information. [3], [4], [9]. These added layers of security include but are not limited to deployment of firewall on the OBD II port, application authentication on wireless dongles, priority management on multiple connected devices.…”
Section: Additional Measuresmentioning
confidence: 99%
“…The NTSC report published in 2020 2 reported that 27% of organizations globally were impacted by malware attacks sent via Android mobile devices. In recent times, we have seen malware producers employ techniques such as obfuscation , Chua and Balachandran [2018], Bacci et al [2018] and repackaging Song et al [2017], Lee et al [2019], , mostly through the change of static features Zhu et al [2018], Sun et al [2017], Hu et al [2014] to avoid detection. Realizing the trend in the growth of mobile-based malware attacks, there have been numerous Artificial Intelligence (AI)-based defense techniques proposed Vasan et al [2020], Luo and Lo [2017], , Makandar and Patrot [2018], Hsiao et al [2019], Singh et al [2019].…”
Section: Introductionmentioning
confidence: 99%