Loading…
Fuzzing CAN Packets into Automobiles
There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network an...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 821 |
container_issue | |
container_start_page | 817 |
container_title | |
container_volume | |
creator | Lee, Hyeryun Choi, Kyunghee Chung, Kihyun Kim, Jaein Yim, Kangbin |
description | There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles. |
doi_str_mv | 10.1109/AINA.2015.274 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>proquest_CHZPO</sourceid><recordid>TN_cdi_proquest_miscellaneous_1685819410</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7098059</ieee_id><sourcerecordid>1685819410</sourcerecordid><originalsourceid>FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233</originalsourceid><addsrcrecordid>eNotjjtPwzAURg0CibQwMrFkYGBJuH7c2B6jikKlqjCA1C1yEhsZ8ihxMtBfT6QyfcvRdw4htxRSSkE_5ptdnjKgmDIpzsiCCqm11CD25yRinLMEM1QXJKKIkAiB-yuyCOELgGdCYkTu19Px6LvPeJXv4jdTfdsxxL4b-zifxr7tS9_YcE0unWmCvfnfJflYP72vXpLt6_NmlW8Tz0CNiYDaoHM1WsNnHQiGInMgKDO1ZHwuE8Cd5cwBrUtbVg5Lo5RiSmtVzbVL8nD6PQz9z2TDWLQ-VLZpTGf7KRQ0U6ioFhRm9O6EemttcRh8a4bfQoJWgJr_AQ29TKA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>1685819410</pqid></control><display><type>conference_proceeding</type><title>Fuzzing CAN Packets into Automobiles</title><source>IEEE Xplore All Conference Series</source><creator>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</creator><creatorcontrib>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</creatorcontrib><description>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</description><identifier>ISSN: 1550-445X</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 147997904X</identifier><identifier>EISBN: 1479979058</identifier><identifier>EISBN: 9781479979059</identifier><identifier>EISBN: 9781479979042</identifier><identifier>DOI: 10.1109/AINA.2015.274</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automobile ; Automobiles ; Automotive engineering ; Bluetooth ; CAN ; Conferences ; Construction ; Controller area network ; Cyber attack ; ECU ; Fuzzing ; Internet ; Monitoring ; Networks ; Packets (communication) ; Ports (Computers) ; Security ; Warning ; Wireless communication</subject><ispartof>2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.817-821</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7098059$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,23929,23930,25139,27923,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7098059$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Hyeryun</creatorcontrib><creatorcontrib>Choi, Kyunghee</creatorcontrib><creatorcontrib>Chung, Kihyun</creatorcontrib><creatorcontrib>Kim, Jaein</creatorcontrib><creatorcontrib>Yim, Kangbin</creatorcontrib><title>Fuzzing CAN Packets into Automobiles</title><title>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</description><subject>Automobile</subject><subject>Automobiles</subject><subject>Automotive engineering</subject><subject>Bluetooth</subject><subject>CAN</subject><subject>Conferences</subject><subject>Construction</subject><subject>Controller area network</subject><subject>Cyber attack</subject><subject>ECU</subject><subject>Fuzzing</subject><subject>Internet</subject><subject>Monitoring</subject><subject>Networks</subject><subject>Packets (communication)</subject><subject>Ports (Computers)</subject><subject>Security</subject><subject>Warning</subject><subject>Wireless communication</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>147997904X</isbn><isbn>1479979058</isbn><isbn>9781479979059</isbn><isbn>9781479979042</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2015</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjjtPwzAURg0CibQwMrFkYGBJuH7c2B6jikKlqjCA1C1yEhsZ8ihxMtBfT6QyfcvRdw4htxRSSkE_5ptdnjKgmDIpzsiCCqm11CD25yRinLMEM1QXJKKIkAiB-yuyCOELgGdCYkTu19Px6LvPeJXv4jdTfdsxxL4b-zifxr7tS9_YcE0unWmCvfnfJflYP72vXpLt6_NmlW8Tz0CNiYDaoHM1WsNnHQiGInMgKDO1ZHwuE8Cd5cwBrUtbVg5Lo5RiSmtVzbVL8nD6PQz9z2TDWLQ-VLZpTGf7KRQ0U6ioFhRm9O6EemttcRh8a4bfQoJWgJr_AQ29TKA</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Lee, Hyeryun</creator><creator>Choi, Kyunghee</creator><creator>Chung, Kihyun</creator><creator>Kim, Jaein</creator><creator>Yim, Kangbin</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Fuzzing CAN Packets into Automobiles</title><author>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Automobile</topic><topic>Automobiles</topic><topic>Automotive engineering</topic><topic>Bluetooth</topic><topic>CAN</topic><topic>Conferences</topic><topic>Construction</topic><topic>Controller area network</topic><topic>Cyber attack</topic><topic>ECU</topic><topic>Fuzzing</topic><topic>Internet</topic><topic>Monitoring</topic><topic>Networks</topic><topic>Packets (communication)</topic><topic>Ports (Computers)</topic><topic>Security</topic><topic>Warning</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Hyeryun</creatorcontrib><creatorcontrib>Choi, Kyunghee</creatorcontrib><creatorcontrib>Chung, Kihyun</creatorcontrib><creatorcontrib>Kim, Jaein</creatorcontrib><creatorcontrib>Yim, Kangbin</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Hyeryun</au><au>Choi, Kyunghee</au><au>Chung, Kihyun</au><au>Kim, Jaein</au><au>Yim, Kangbin</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Fuzzing CAN Packets into Automobiles</atitle><btitle>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2015-03-01</date><risdate>2015</risdate><spage>817</spage><epage>821</epage><pages>817-821</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><eisbn>147997904X</eisbn><eisbn>1479979058</eisbn><eisbn>9781479979059</eisbn><eisbn>9781479979042</eisbn><coden>IEEPAD</coden><abstract>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2015.274</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-445X |
ispartof | 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.817-821 |
issn | 1550-445X 2332-5658 |
language | eng |
recordid | cdi_proquest_miscellaneous_1685819410 |
source | IEEE Xplore All Conference Series |
subjects | Automobile Automobiles Automotive engineering Bluetooth CAN Conferences Construction Controller area network Cyber attack ECU Fuzzing Internet Monitoring Networks Packets (communication) Ports (Computers) Security Warning Wireless communication |
title | Fuzzing CAN Packets into Automobiles |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T01%3A28%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Fuzzing%20CAN%20Packets%20into%20Automobiles&rft.btitle=2015%20IEEE%2029th%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Lee,%20Hyeryun&rft.date=2015-03-01&rft.spage=817&rft.epage=821&rft.pages=817-821&rft.issn=1550-445X&rft.eissn=2332-5658&rft.coden=IEEPAD&rft_id=info:doi/10.1109/AINA.2015.274&rft.eisbn=147997904X&rft.eisbn_list=1479979058&rft.eisbn_list=9781479979059&rft.eisbn_list=9781479979042&rft_dat=%3Cproquest_CHZPO%3E1685819410%3C/proquest_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1685819410&rft_id=info:pmid/&rft_ieee_id=7098059&rfr_iscdi=true |