2019
DOI: 10.1109/tifs.2018.2870826
|View full text |Cite
|
Sign up to set email alerts
|

READ: Reverse Engineering of Automotive Data Frames

Abstract: Security analytics and forensics applied to in-vehicle networks are growing research areas that gained relevance after recent reports of cyber-attacks against unmodified licensed vehicles. However, the application of security analytics algorithms and tools to the automotive domain is hindered by the lack of public specifications about proprietary data exchanged over in-vehicle networks. Since the controller area network (CAN) bus is the de-facto standard for the interconnection of automotive electronic control… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
74
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 98 publications
(75 citation statements)
references
References 21 publications
0
74
0
1
Order By: Relevance
“…However, visual inspection of the token plot (bottom) show values vacillating between the 4-bit minimum (2 0 = 0) and maximum (2 3−1 = 15) over a regular period, revealing that it is a Counter Token. The characteristics of Counter Tokens, as well as Checksum Tokens, are described in [13] and are apparently added to prevent particular types of attacks in safety-critical messages (e.g., injections or replay attacks). We note that many of our unmatched tokens may correspond to these Counter or Checksum Tokens.…”
Section: Resultsmentioning
confidence: 99%
“…However, visual inspection of the token plot (bottom) show values vacillating between the 4-bit minimum (2 0 = 0) and maximum (2 3−1 = 15) over a regular period, revealing that it is a Counter Token. The characteristics of Counter Tokens, as well as Checksum Tokens, are described in [13] and are apparently added to prevent particular types of attacks in safety-critical messages (e.g., injections or replay attacks). We note that many of our unmatched tokens may correspond to these Counter or Checksum Tokens.…”
Section: Resultsmentioning
confidence: 99%
“…We categorized some typical related works about reverse engineering as below [8][9][10] [ [20][21][22] Multiplayer online game [11] Logic analysis [12][13][14] Semi-automatic tools, including Ollydbg, Windbg, and Cheat Engine, are mature enough for reverse engineering.…”
Section: Related Workmentioning
confidence: 99%
“…They defined 3 data types of data segment, then designed several data segment byte feature extraction methods to construct feature sequences, and finally presented a deep learning-based approach with feature sequences as input to recognize the data type byte by byte. M. Marchetti [22] proposed a method for the automatic Reverse Engineering of Automotive Data frames. It has been designed to analyze traffic traces containing unknown CAN (controller area network) bus messages in order to automatically identify and label different types of data.…”
Section: Related Workmentioning
confidence: 99%
“…Automotive systems based on CAN bus are already in common use, but no security considerations against hacking have been made since the design of the protocol. Since 2010, many instances of car hacking through the on-board diagnostics II (OBD-II) port for in-vehicle diagnosis and the infotainment system have been reported [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. Thus, security measures for modern cars against hacking threats also have been actively researched [ 7 , 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%