Automotive Vulnerability Detection System

نویسندگان

  • David K. Wittenberg
  • Jeffrey Smith
چکیده

In [1] we presented a Vulnerability Detection System (VDS) that can detect emergent vulnerabilities in complex Cyber Physical Systems (CPSs). It used the attacker’s point of view by collecting a target system’s vulnerability information from varied sources and populating an Attack Point (AP) database. From these APs, a Hierarchical Task Network (HTN) generated the set of composite device-level attack scenarios. The VDS used Alloy [2], a Satisfiability (SAT) planner to reduce the cardinality of the generated space by evaluating the feasibility of each attack. In [3], we specialized the VDS for the automobile domain. This paper further 1) specializes our prior research by submitting the generated prioritized list to an Automotive-specific Attack Evaluation Process (AAEP) and 2) enhances our prior research with a method to discover and test vulnerabilities by reverse engineering the actual binary code. With a combination of simulation and vehicle instrumented real-time execution, the AAEP confirms each candidate attack. The AAEP’s output is used as feedback to refine the SAT constraint model model. A novel part of AAEP is our Automated Reverse Engineering (ARE) system, which greatly reduces the search space for software bugs. The VDS is designed to support short product release cycles. A. Knowledge Acquisition

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Physical-Layer Key Generation for Automotive Cyber-Physical System Security

Modern automotive Cyber-Physical Systems (CPSs) are increasingly adopting wireless communications for IntraVehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance. Regrettably, this new trend results in new security vulnerabilities that can put the s...

متن کامل

Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures

The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the win...

متن کامل

An Unknown Input Observer for Fault Detection Based on Sliding Mode Observer in Electrical Steering Assist Systems

Steering assist system controls the force transfer behavior of the steering system and improves the steering probability of the vehicle. Moreover, it is an interface between the diver and vehicle. Fault detection in electrical assisted steering systems is a challenging problem due to frequently use of these systems. This paper addresses the fault detection and reconstruction in automotive elect...

متن کامل

Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

Starting from practical scenarios we underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, we outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks to less explored ones from the automotive indus...

متن کامل

Dealing with uncertainty in modern supply chains: vulnerability and risk management

The financial crisis has clearly shown the vulnerability of our global economy. New innovative tools are therefore needed to improve supply chain management thus contributing to recover from the economy slowdown. In this work we have developed a stochastic model for the automotive supply chain, dealing with uncertainty, and supporting strategic and tactical decisionmaking. This model takes into...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016