2010 IEEE Symposium on Security and Privacy 2010
DOI: 10.1109/sp.2010.34
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Security Analysis of a Modern Automobile

Abstract: Abstract-Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
611
0
8

Year Published

2011
2011
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,336 publications
(620 citation statements)
references
References 8 publications
0
611
0
8
Order By: Relevance
“…Relevant research has focused primarily on proof-ofconcept attacks [3] on the integrity of sensing and actuation or the availability of communications. Defence is usually about resilience through redundancy [11] or prevention through authentication and encrypted communication [12].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Relevant research has focused primarily on proof-ofconcept attacks [3] on the integrity of sensing and actuation or the availability of communications. Defence is usually about resilience through redundancy [11] or prevention through authentication and encrypted communication [12].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A cyber-attack against or through an associated network affects the movement of a vehicle in a manner that gives rise to a range of new security challenges. Such incidents have already been reported to have occurred both in the wild [1], [2] and in controlled experimental environments [3], [4] and competitions [5].…”
Section: Introductionmentioning
confidence: 99%
“…But in exchange we must consider the "nonsensical" and unpredictable behavior caused by code defects. We must also consider a wide array of traditional and nontraditional security concerns; the nature of what constitutes a security exploit in a self-driving car is quite different vulnerabilities exposed by traditional IT software [1].…”
Section: Trusting Self-driving Carsmentioning
confidence: 99%
“…However, over the last few years, autonomous vehicles have become a routine target for experimental cyber attacks, as demonstrated as early as 2009 by the University of Washington [1], [2] and in numerous blackhat conferences since then. As a result, there is a need for protection systems appropriate for active attacks against an autonomous vehicle's integrity or availability, and the corresponding impact on its actuation.…”
Section: Introductionmentioning
confidence: 99%