Loading…

Fuzzing CAN Packets into Automobiles

There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network an...

Full description

Saved in:
Bibliographic Details
Main Authors: Lee, Hyeryun, Choi, Kyunghee, Chung, Kihyun, Kim, Jaein, Yim, Kangbin
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 821
container_issue
container_start_page 817
container_title
container_volume
creator Lee, Hyeryun
Choi, Kyunghee
Chung, Kihyun
Kim, Jaein
Yim, Kangbin
description There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.
doi_str_mv 10.1109/AINA.2015.274
format conference_proceeding
fullrecord <record><control><sourceid>proquest_CHZPO</sourceid><recordid>TN_cdi_proquest_miscellaneous_1685819410</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7098059</ieee_id><sourcerecordid>1685819410</sourcerecordid><originalsourceid>FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233</originalsourceid><addsrcrecordid>eNotjjtPwzAURg0CibQwMrFkYGBJuH7c2B6jikKlqjCA1C1yEhsZ8ihxMtBfT6QyfcvRdw4htxRSSkE_5ptdnjKgmDIpzsiCCqm11CD25yRinLMEM1QXJKKIkAiB-yuyCOELgGdCYkTu19Px6LvPeJXv4jdTfdsxxL4b-zifxr7tS9_YcE0unWmCvfnfJflYP72vXpLt6_NmlW8Tz0CNiYDaoHM1WsNnHQiGInMgKDO1ZHwuE8Cd5cwBrUtbVg5Lo5RiSmtVzbVL8nD6PQz9z2TDWLQ-VLZpTGf7KRQ0U6ioFhRm9O6EemttcRh8a4bfQoJWgJr_AQ29TKA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>1685819410</pqid></control><display><type>conference_proceeding</type><title>Fuzzing CAN Packets into Automobiles</title><source>IEEE Xplore All Conference Series</source><creator>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</creator><creatorcontrib>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</creatorcontrib><description>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</description><identifier>ISSN: 1550-445X</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 147997904X</identifier><identifier>EISBN: 1479979058</identifier><identifier>EISBN: 9781479979059</identifier><identifier>EISBN: 9781479979042</identifier><identifier>DOI: 10.1109/AINA.2015.274</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automobile ; Automobiles ; Automotive engineering ; Bluetooth ; CAN ; Conferences ; Construction ; Controller area network ; Cyber attack ; ECU ; Fuzzing ; Internet ; Monitoring ; Networks ; Packets (communication) ; Ports (Computers) ; Security ; Warning ; Wireless communication</subject><ispartof>2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.817-821</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7098059$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,780,784,789,790,23929,23930,25139,27923,27924,54554,54931</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7098059$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Hyeryun</creatorcontrib><creatorcontrib>Choi, Kyunghee</creatorcontrib><creatorcontrib>Chung, Kihyun</creatorcontrib><creatorcontrib>Kim, Jaein</creatorcontrib><creatorcontrib>Yim, Kangbin</creatorcontrib><title>Fuzzing CAN Packets into Automobiles</title><title>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</description><subject>Automobile</subject><subject>Automobiles</subject><subject>Automotive engineering</subject><subject>Bluetooth</subject><subject>CAN</subject><subject>Conferences</subject><subject>Construction</subject><subject>Controller area network</subject><subject>Cyber attack</subject><subject>ECU</subject><subject>Fuzzing</subject><subject>Internet</subject><subject>Monitoring</subject><subject>Networks</subject><subject>Packets (communication)</subject><subject>Ports (Computers)</subject><subject>Security</subject><subject>Warning</subject><subject>Wireless communication</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>147997904X</isbn><isbn>1479979058</isbn><isbn>9781479979059</isbn><isbn>9781479979042</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2015</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjjtPwzAURg0CibQwMrFkYGBJuH7c2B6jikKlqjCA1C1yEhsZ8ihxMtBfT6QyfcvRdw4htxRSSkE_5ptdnjKgmDIpzsiCCqm11CD25yRinLMEM1QXJKKIkAiB-yuyCOELgGdCYkTu19Px6LvPeJXv4jdTfdsxxL4b-zifxr7tS9_YcE0unWmCvfnfJflYP72vXpLt6_NmlW8Tz0CNiYDaoHM1WsNnHQiGInMgKDO1ZHwuE8Cd5cwBrUtbVg5Lo5RiSmtVzbVL8nD6PQz9z2TDWLQ-VLZpTGf7KRQ0U6ioFhRm9O6EemttcRh8a4bfQoJWgJr_AQ29TKA</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>Lee, Hyeryun</creator><creator>Choi, Kyunghee</creator><creator>Chung, Kihyun</creator><creator>Kim, Jaein</creator><creator>Yim, Kangbin</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150301</creationdate><title>Fuzzing CAN Packets into Automobiles</title><author>Lee, Hyeryun ; Choi, Kyunghee ; Chung, Kihyun ; Kim, Jaein ; Yim, Kangbin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Automobile</topic><topic>Automobiles</topic><topic>Automotive engineering</topic><topic>Bluetooth</topic><topic>CAN</topic><topic>Conferences</topic><topic>Construction</topic><topic>Controller area network</topic><topic>Cyber attack</topic><topic>ECU</topic><topic>Fuzzing</topic><topic>Internet</topic><topic>Monitoring</topic><topic>Networks</topic><topic>Packets (communication)</topic><topic>Ports (Computers)</topic><topic>Security</topic><topic>Warning</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Hyeryun</creatorcontrib><creatorcontrib>Choi, Kyunghee</creatorcontrib><creatorcontrib>Chung, Kihyun</creatorcontrib><creatorcontrib>Kim, Jaein</creatorcontrib><creatorcontrib>Yim, Kangbin</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Hyeryun</au><au>Choi, Kyunghee</au><au>Chung, Kihyun</au><au>Kim, Jaein</au><au>Yim, Kangbin</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Fuzzing CAN Packets into Automobiles</atitle><btitle>2015 IEEE 29th International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2015-03-01</date><risdate>2015</risdate><spage>817</spage><epage>821</epage><pages>817-821</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><eisbn>147997904X</eisbn><eisbn>1479979058</eisbn><eisbn>9781479979059</eisbn><eisbn>9781479979042</eisbn><coden>IEEPAD</coden><abstract>There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2015.274</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-445X
ispartof 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, 2015, p.817-821
issn 1550-445X
2332-5658
language eng
recordid cdi_proquest_miscellaneous_1685819410
source IEEE Xplore All Conference Series
subjects Automobile
Automobiles
Automotive engineering
Bluetooth
CAN
Conferences
Construction
Controller area network
Cyber attack
ECU
Fuzzing
Internet
Monitoring
Networks
Packets (communication)
Ports (Computers)
Security
Warning
Wireless communication
title Fuzzing CAN Packets into Automobiles
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T01%3A28%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Fuzzing%20CAN%20Packets%20into%20Automobiles&rft.btitle=2015%20IEEE%2029th%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Lee,%20Hyeryun&rft.date=2015-03-01&rft.spage=817&rft.epage=821&rft.pages=817-821&rft.issn=1550-445X&rft.eissn=2332-5658&rft.coden=IEEPAD&rft_id=info:doi/10.1109/AINA.2015.274&rft.eisbn=147997904X&rft.eisbn_list=1479979058&rft.eisbn_list=9781479979059&rft.eisbn_list=9781479979042&rft_dat=%3Cproquest_CHZPO%3E1685819410%3C/proquest_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i208t-40da5ffd5ea3550042546f0412ad723799403fe32f01dbebcf5ba88828998c233%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1685819410&rft_id=info:pmid/&rft_ieee_id=7098059&rfr_iscdi=true