2019
DOI: 10.1002/spe.2698
|View full text |Cite
|
Sign up to set email alerts
|

Static analysis of Android Auto infotainment and on‐board diagnostics II apps

Abstract: Summary Smartphone and automotive technologies are rapidly converging, letting drivers enjoy communication and infotainment facilities and monitor in‐vehicle functionalities, via on‐board diagnostics (OBD) technology. Among the various automotive apps available in playstores, Android Auto infotainment and OBD‐II apps are widely used and are the most popular choice for smartphone to car interaction. Automotive apps have the potential of turning cars into smartphones on wheels but can be also the gateway of atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 24 publications
(38 reference statements)
0
10
0
Order By: Relevance
“…This infection can be avoided by executing and analyzing the malicious URL in a controlled cloud sandbox: a serverless computing environment 48 . The second category of analysis is called static analysis 49 in which the investigation is processed before execution and the analysis is based on the information available in the URL. The extracted attributes may be comprising of lexical parameters in the URL string, host details, and occasionally HTML 50 and JavaScript code content 51 .…”
Section: Proposed Methodologymentioning
confidence: 99%
“…This infection can be avoided by executing and analyzing the malicious URL in a controlled cloud sandbox: a serverless computing environment 48 . The second category of analysis is called static analysis 49 in which the investigation is processed before execution and the analysis is based on the information available in the URL. The extracted attributes may be comprising of lexical parameters in the URL string, host details, and occasionally HTML 50 and JavaScript code content 51 .…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Internet service portals (e.g., smartphone applications) are generally enablers for remotely accessing the EV features. EVs use wireless communications to exchange information with web-based and smartphone applications (e.g., Tesla for Tesla EVs and NissanConnect ® for Nissan EVs) for monitoring and controlling EV charging [81], [82]. Also, smartphones are often connected to the built-in EV IVI dashboard via bluetooth and USB ports for media playback and smartphone access.…”
Section: ) Ev-{x=internet Service Portals}mentioning
confidence: 99%
“…Content may change prior to final publication. and smartphone applications use long and medium range wireless channels such as cellular networks and WiFi [81], [82], whereas key fobs use short-range RF or near-field communication (NFC) [79], [83].…”
Section: ) Ev-{x=internet Service Portals}mentioning
confidence: 99%
“…This approach has been widely applied to the detection of SQL injections in Web applications [66], leakages of sensitive data [26,27], etc. A first attempt to apply such approach to a scenario similar to IoT was performed by Mandal et al [47] and Panarotto et al [58], that utilized this approach to detect leakages and injection vulnerabilities in Android automotive apps [49]. Huuck [40] discussed the use static code analysis to detect some of these types of issues.…”
Section: Related Workmentioning
confidence: 99%