Off is Not Off: On the Security of Parked Vehicles

2020 IEEE Conference on Communications and Network Security (CNS)(2020)

引用 1|浏览35
暂无评分
摘要
While various ways of attacking and thus controlling the vehicle have been demonstrated, all these attacks were shown to be feasible and effective only while the vehicle is running, i.e., ignition is on. In this paper, we invalidate the conventional belief that remote vehicle attacks are feasible and hence their defenses are required only when the vehicle's ignition is on. We first analyze how operation (e.g., normal, sleep, listen) modes of electronic control units (ECUs) are defined in various invehicle network standards and how they are implemented in real vehicles. From this analysis, we discover that an adversary can exploit the wake-up function of in-vehicle networks-which was originally designed for enhanced user experience/convenience (e.g., remote diagnosis, remote temperature control) -as an attack vector. Ironically, the battery-saving feature in in-vehicle networks makes it easier for an attacker to wake up ECUs and, therefore, mount Battery-Drain (BD) orDenial-of-Bodycontrol (DoB), and Unattended Control (UC). In particular, we show that the adversary mounting the BD attack can completely drain the vehicle battery within an hour in the worst case, the attack mounting the DoB attack can disable the communications between the vehicle and its key-fob by shutting down the associated ECU, thus immobilizing the vehicle, and the adversary can physically access a vehicle by controlling the door and/or trunk locks via the UC attack.
更多
查看译文
关键词
electronic control units,ECUs,in-vehicle network standards,remote diagnosis,remote temperature control,attack vector,Unattended Control,BD attack,vehicle battery,DoB attack,UC attack,parked vehicles,attacking,ignition,conventional belief,remote vehicle attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要