Real-Time Network Defense of SAE J1939 Address Claim Attacks

Matthew Timothy Campo,Subhojeet Mukherjee,Jeremy Daily

SAE INTERNATIONAL JOURNAL OF COMMERCIAL VEHICLES(2021)

引用 0|浏览0
暂无评分
摘要
Heavy vehicles are essential for the modern economy, delivering critical food, supplies, and freight throughout the world. Connected heavy vehicles are also driven by embedded computers that utilize internal communication using common standards. However, some implementations of the standards leave an opening for a malicious actor to abuse the system. One such abuse case is a cyber-attack known as the "Address Claim Attack." Proposed in 2018, this attack uses a single network message to disable all communication to and from a target electronic control unit, which may have a detrimental effect on operating the vehicle. This article demonstrates the viability of the attack and then describes the implementation of a solution to prevent this attack in real time without requiring any intervention from the manufacturer of the target devices. The defense technique uses a bit-banged Controller Area Network (CAN) filter to detect the attack. Once an attack is discovered, the defender induces a CAN protocol error to remove the malicious message from the network. We discuss our results in terms of their applicability for Address Claim Attacks and possible implications for preventing a variety of network-based attacks in real time.
更多
查看译文
关键词
Cybersecurity, Network, Hardware, Software, Realtime, Address Claim, J1939, CAN, Embedded Software, Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要