TAILIEUCHUNG - Experimental Security Analysis of a Modern Automobile

Defining Critical Infrastructure: Nearly every organization is susceptible to a cyber attack. However, it is cost prohibitive to protect everything, and not every asset, even those within critical infrastructures, will have an impact on national security or critical functions. The government should work closely with each sector to identify elements of critical infrastructure that, if damaged or destroyed, could cause great loss of life or significant economic damage impacting our national security. Further, any targeted or limited regulation should only apply to critical functions or facilities rather than entire organizations to ensure that the impact is not. | Experimental Security Analysis of a Modern Automobile Karl Koscher Alexei Czeskis Franziska Roesner Shwetak Patel and Tadayoshi Kohno Department of Computer Science and Engineering University of Washington Seattle Washington 98195-2350 Email supersat aczeskis franzi shwetak yoshi @ Stephen Checkoway Damon McCoy Brian Kantor Danny Anderson Hovav Shacham and Stefan Savage Department of Computer Science and Engineering University of California San Diego La Jolla California 92093-0404 Email s dlmccoy brian d8anders hovav savage @ Abstract Modern automobiles are no longer mere mechanical devices they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate virtually any Electronic Control Unit ECU can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments both in the lab and in road tests we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input including disabling the brakes selectively braking individual wheels on demand stopping the engine and so on. We find that it is possible to bypass rudimentary network security protections within the car such as maliciously bridging between our car s two internal subnets. We also present composite attacks that leverage individual weaknesses including an attack that embeds malicious code in a car s telematics unit and that will completely erase any evidence of its presence after a crash. Looking forward we discuss the complex challenges in addressing these vulnerabilities while .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.