Skip to main content

2018 | OriginalPaper | Buchkapitel

Counter Attacks for Bus-off Attacks

verfasst von : Daisuke Souma, Akira Mori, Hideki Yamamoto, Yoichi Hata

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent automotive systems are increasingly complex and networked. The situation has given rise to various cyber-attack methods. Cho and Shin introduced a new type of Denial of Service (DoS) attacks called bus-off attacks [2], which abuses certain properties of Control Area Network (CAN) used for vehicle control. They not only introduced a novel software based attack method but also proposed a countermeasure which resets the victim node to keep it from going into the disabled state. However, their countermeasure could not avoid unintended effects caused by the attack. In this paper, we propose a novel countermeasure for the bus-off attacks introduced by Cho and Shin. The method forces the node that started the bus-off attack into the disabled state in a way similar to the original bus-off attack. We have implemented the countermeasure and evaluated it in a real car environment to show the effectiveness of the method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We omit the technical details here.
 
2
This is specified in the CAN specification [7].
 
Literatur
1.
Zurück zum Zitat Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: 20th USENIX Conference on Security (2011) Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: 20th USENIX Conference on Security (2011)
2.
Zurück zum Zitat Cho, K., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM (2016) Cho, K., Shin, K.G.: Error handling of in-vehicle networks makes them vulnerable. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM (2016)
3.
Zurück zum Zitat Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the CAN bus. In: 5th Embedded Security in Cars (ESCAR Europe) (2016) Dagan, T., Wool, A.: Parrot, a software-only anti-spoofing defense system for the CAN bus. In: 5th Embedded Security in Cars (ESCAR Europe) (2016)
4.
Zurück zum Zitat Dagan, T., Wool, A.: Testing the boundaries of the Parrot anti-spoofing defense system. In: 5th Embedded Security in Cars (ESCAR USA) (2017) Dagan, T., Wool, A.: Testing the boundaries of the Parrot anti-spoofing defense system. In: 5th Embedded Security in Cars (ESCAR USA) (2017)
5.
Zurück zum Zitat Hamada, Y., Inoue, M., Horihata, S., Kamemura, A.: Intrusion detection by density estimation of reception cycle periods for in-vehicle networks: a proposal. In: Presented at the 14th ESCAR Europe Conference, 16–17 November 2016 Hamada, Y., Inoue, M., Horihata, S., Kamemura, A.: Intrusion detection by density estimation of reception cycle periods for in-vehicle networks: a proposal. In: Presented at the 14th ESCAR Europe Conference, 16–17 November 2016
6.
Zurück zum Zitat Hartkopp, O., Reuber, C., Schilling, R.: MaCAN - message authenticated CAN. In: Embedded Security in Cars (ESCAR) 2012, Berlin, Germany, November 2012 Hartkopp, O., Reuber, C., Schilling, R.: MaCAN - message authenticated CAN. In: Embedded Security in Cars (ESCAR) 2012, Berlin, Germany, November 2012
7.
Zurück zum Zitat ISO 11898:2015 Road vehicles - Controller area network (CAN) (2015) ISO 11898:2015 Road vehicles - Controller area network (CAN) (2015)
8.
Zurück zum Zitat Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010) Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)
9.
Zurück zum Zitat Kameoka, R., Kubota, T., Shiozaki, M., Shirahata, M., Kurachi, R., Fujino, T.: Bus-off attack against CAN ECU using stuff error injection from Raspberry Pi. In: Proceedings of Symposium on Cryptography and Information Security (SCIS), Japan (2017). (in Japaneses) Kameoka, R., Kubota, T., Shiozaki, M., Shirahata, M., Kurachi, R., Fujino, T.: Bus-off attack against CAN ECU using stuff error injection from Raspberry Pi. In: Proceedings of Symposium on Cryptography and Information Security (SCIS), Japan (2017). (in Japaneses)
10.
Zurück zum Zitat Lin, C.W., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. ASE Sci. J. 1(2), 80–92 (2012) Lin, C.W., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. ASE Sci. J. 1(2), 80–92 (2012)
11.
Zurück zum Zitat Muter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicle Symposium, pp. 1110–1115 (2011) Muter, M., Asaj, N.: Entropy-based anomaly detection for in-vehicle networks. In: IEEE Intelligent Vehicle Symposium, pp. 1110–1115 (2011)
12.
Zurück zum Zitat Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of preventing unauthorized data transmission in controller area network. In: IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2012) Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., Oishi, K.: A method of preventing unauthorized data transmission in controller area network. In: IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2012)
13.
Zurück zum Zitat Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEFCON 21, 260–264 (2013) Miller, C., Valasek, C.: Adventures in automotive networks and control units. DEFCON 21, 260–264 (2013)
14.
Zurück zum Zitat Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014) Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)
15.
Zurück zum Zitat Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015)
16.
Zurück zum Zitat Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. In: Presented at the 13th ESCAR Europe Conference, 11–12 November 2015 Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. In: Presented at the 13th ESCAR Europe Conference, 11–12 November 2015
17.
Zurück zum Zitat Nie, S., Liu, L., Du, Y.: Free-fall: hacking TESLA from wireless to CAN bus. Black Hat USA (2016) Nie, S., Liu, L., Du, Y.: Free-fall: hacking TESLA from wireless to CAN bus. Black Hat USA (2016)
18.
Zurück zum Zitat Nilsson, D.K., Larson, U.E., Jonsson, E.: Efficient in-vehicle delayed data authentication based on compound message authentication codes. In: Vehicular Technology Conference VTC (2008) Nilsson, D.K., Larson, U.E., Jonsson, E.: Efficient in-vehicle delayed data authentication based on compound message authentication codes. In: Vehicular Technology Conference VTC (2008)
20.
Zurück zum Zitat Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: ICOIN (2016) Song, H.M., Kim, H.R., Kim, H.K.: Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In: ICOIN (2016)
21.
Zurück zum Zitat Taylor, A., Japkowicz, N.: Frequency-based anomaly detection for the automotive CAN bus. In: WCICSS (2015) Taylor, A., Japkowicz, N.: Frequency-based anomaly detection for the automotive CAN bus. In: WCICSS (2015)
22.
Zurück zum Zitat Wasicek, A., Pese, M., Weimerskirch, A., Burakova, Y., Singh, K.: Context-aware intrusion detection in automotive control system. In: Presented at the 5th ESCAR USA Conference, USA, 21–22 June 2017 Wasicek, A., Pese, M., Weimerskirch, A., Burakova, Y., Singh, K.: Context-aware intrusion detection in automotive control system. In: Presented at the 5th ESCAR USA Conference, USA, 21–22 June 2017
Metadaten
Titel
Counter Attacks for Bus-off Attacks
verfasst von
Daisuke Souma
Akira Mori
Hideki Yamamoto
Yoichi Hata
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-99229-7_27

Premium Partner