An Enhanced Method for Reverse Engineering CAN Data Payload
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, W. | - |
dc.contributor.author | Lee, S. | - |
dc.contributor.author | Joo, K. | - |
dc.contributor.author | Jo, H.J. | - |
dc.contributor.author | Lee, D.H. | - |
dc.date.available | 2021-03-23T05:40:09Z | - |
dc.date.created | 2021-03-23 | - |
dc.date.issued | 2021-04 | - |
dc.identifier.issn | 0018-9545 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/40725 | - |
dc.description.abstract | Recently, numerous electronic components are installed in vehicles, providing drivers and passengers with increased safety and convenience. The electronic components construct an in-vehicle network that internally shares relevant status information about the vehicle. As modern vehicles become more computerized, the potential for automotive cyber-security threats also increases a fact that has been illustrated clearly by various car-hacking demonstrations. Using the controller area network (CAN), the de facto standard protocol in the automotive industry that facilitates in-vehicle network communication, car-hacking demonstrations inject critical CAN messages to control vehicular functions. In efforts to address this security issue, car manufacturers, in turn, have made confidential the CAN database (i.e., DBC format file), where signal information assigned in the CAN data payload is specified. However, it has since become known that this policy does not hermetically seal a vehicular network against cyber attacks. On the contrary, in-depth automotive security research has been hindered significantly because of the limited information accessible by researchers. For example, automotive intrusion detection systems (IDS) identify and alert when there is a vehicular break-in, and this technology is a major area of study in automotive cyber security research. For the automotive IDS that analyzes CAN traffic, information in the DBC format file greatly improves detection veracity. However, most IDS technologies to date have been independently developed without the confidential CAN DB information and, as a result, do not mitigate threats to a satisfactory standard. In this paper, we propose an enhanced method that identifies signal boundaries in a CAN data payload, which is specified in the DBC format file. Unlike an existing method that is designed based on total bit-flip rates, our method analyzes bit-flip time series not total bit-flip rates so that signal boundaries can be more clearly identified. In this paper, we use a publicly available DBC format file called OpenDBC as a reference, and show that our method outperforms the existing method. IEEE | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.relation.isPartOf | IEEE Transactions on Vehicular Technology | - |
dc.title | An Enhanced Method for Reverse Engineering CAN Data Payload | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TVT.2021.3063261 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Vehicular Technology, v.70, no.4, pp.3371 - 3381 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000647411800035 | - |
dc.identifier.scopusid | 2-s2.0-85102261420 | - |
dc.citation.endPage | 3381 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 3371 | - |
dc.citation.title | IEEE Transactions on Vehicular Technology | - |
dc.citation.volume | 70 | - |
dc.contributor.affiliatedAuthor | Jo, H.J. | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Automobiles | - |
dc.subject.keywordAuthor | Automotive engineering | - |
dc.subject.keywordAuthor | Automotive Security | - |
dc.subject.keywordAuthor | CAN DBC Format File | - |
dc.subject.keywordAuthor | Controller Area Network (CAN) | - |
dc.subject.keywordAuthor | Intrusion detection | - |
dc.subject.keywordAuthor | Payloads | - |
dc.subject.keywordAuthor | Reverse Engineering | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Software | - |
dc.subject.keywordAuthor | Standards | - |
dc.subject.keywordPlus | Automobile manufacture | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordPlus | Control system synthesis | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.subject.keywordPlus | Network components | - |
dc.subject.keywordPlus | Personal computing | - |
dc.subject.keywordPlus | Reverse engineering | - |
dc.subject.keywordPlus | Vehicles | - |
dc.subject.keywordPlus | Controller area network | - |
dc.subject.keywordPlus | Electronic component | - |
dc.subject.keywordPlus | In-vehicle networks | - |
dc.subject.keywordPlus | Intrusion Detection Systems | - |
dc.subject.keywordPlus | Limited information | - |
dc.subject.keywordPlus | Signal information | - |
dc.subject.keywordPlus | Status informations | - |
dc.subject.keywordPlus | Vehicular networks | - |
dc.subject.keywordPlus | Network security | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalResearchArea | Transportation | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Transportation Science & Technology | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.