网络数据包
计算机科学
计算机网络
模糊测试
蓝牙
脆弱性(计算)
计算机安全
简单(哲学)
频道(广播)
互联网
无线
电信
操作系统
软件
认识论
哲学
作者
Hyeryun Lee,Kyunghee Choi,Kihyun Chung,Jaein Kim,Kangbin Yim
标识
DOI:10.1109/aina.2015.274
摘要
There have been many warnings that automobiles are vulnerable to the attacks through the network, CAN which connects the ECUs (Electrical Control Units) embedded in the automobiles. Some previous studies showed that the warnings were actual treats. They analyzed the packets flowing on the network and used the packets constructed based on the analysis. We show that it is possible to attack automobiles without any in-depth knowledge about automobiles and specially designed tools to analyze the packets. Experiments are performed in two phases. In the first phase, the victims automobiles are attacked with the packets constructed with the CAN IDs gathered from the sniffed packets flowing in the automobiles. It is not a problem at all to gather CANIDs since CAN is an open simple standard protocol and there are many tools to sniff CAN packets in the Internet. In the second phase, the attack packets are constructed in a completely random manner without any previous information such as CAN IDs. The packets are injected into the network via Bluetooth, a wireless channel. Through the experiments, we show the network vulnerability of automobiles.
科研通智能强力驱动
Strongly Powered by AbleSci AI