Author:
Harrison Lee,Pickford James
Abstract
<div class="section abstract"><div class="htmlview paragraph">There continues to be massive advancements in modern connected vehicles and with these advancements, connectivity continues to rapidly become more integral to the way these vehicles are designed and operated.</div><div class="htmlview paragraph">Vehicle connectivity was originally introduced for the purpose of providing software updates to the vehicle’s main system software, and we have seen the adoption of Over The Air updates (OTA) become mainstream with most OEMs. The exploitation of this connectivity is far more reaching than just basic software updates. In the latest vehicles it is possible to update software not just on the main vehicle systems, but to potentially update embedded software in all smart ECUs within the vehicle.</div><div class="htmlview paragraph">Only using the connectivity to push data to the vehicle is not making full use of the potential of this increased connectivity. Being able to collect vehicle data for offline analysis and processing also brings huge benefits to the use of this technology.</div><div class="htmlview paragraph">Using these technologies brings not only great advantages and ease of use, but it also provides an extremely attractive threat landscape for modern cyber attackers – which must be appropriately secured to guard against such threats.</div><div class="htmlview paragraph">The technology described in this paper provides a comprehensive solution to the problems of vehicle intrusion and in-life threat management - using hardware monitors to provide low-latency and reliable threat detection.</div></div>
Reference13 articles.
1. Checkoway , S. ,
McCoy , D. ,
Kantor , B. ,
Anderson , D.
et al.
Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium 4 2011 447 462
2. Studnia , I. ,
Nicomette , V. ,
Alata , E. ,
Deswarte , Y.
et al.
Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks 43rd Annual IEEE/IFIP (DSNW) 2013 1 12
3. Miller , C. and
Valasek , C.
Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 2015 2015 91
4. Hoppe , T. ,
Kiltz , S. , and
Dittmann , J.
Security Threats to Automotive Can Networks–Practical Examples and Selected Short-Term Countermeasures International Conference on Computer Safety, Reliability, and Security 2008 235 248
5. Koscher , K. ,
Czeskis , A. ,
Roesner , F. ,
Patel , S.
et al.
Experimental Security Analysis of a Modern Automobile 2010 IEEE Symposium on Security and Privacy 2010 447 462