TAILIEUCHUNG - Comprehensive Experimental Analyses of Automotive Attack Surfaces

Remove trim, bumpers etc as required. It can make the job easier in some cases if the bulk of the old panel is cut off first with a sharp chisel, leaving the welded areas much more accessible. Make a quick note of where and how it’s welded, so that the new panel can be welded in the same places. (Note: some wings may be welded on to raised mounts, making weld position important!) Now each spot weld needs to be located and cleanly removed. Purpose-made spotweld drills are available for this, which work on the basic principle of. | Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway Damon McCoy Brian Kantor Danny Anderson Hovav Shacham and Stefan Savage University of California San Diego Karl Koscher Alexei Czeskis Franziska Roesner and Tadayoshi Kohno University of Washington Abstract Modern automobiles are pervasively computerized and hence potentially vulnerable to attack. However while previous research has shown that the internal networks within some modern cars are insecure the associated threat model requiring prior physical access has justifiably been viewed as unrealistic. Thus it remains an open question if automobiles can also be susceptible to remote compromise. Our work seeks to put this question to rest by systematically analyzing the external attack surface of a modern automobile. We discover that remote exploitation is feasible via a broad range of attack vectors including mechanics tools CD players Bluetooth and cellular radio and further that wireless communications channels allow long distance vehicle control location tracking in-cabin audio exfiltration and theft. Finally we discuss the structural characteristics of the automotive ecosystem that give rise to such problems and highlight the practical challenges in mitigating them. 1 Introduction Modern cars are controlled by complex distributed computer systems comprising millions of lines of code executing on tens of heterogeneous processors with rich connectivity provided by internal networks . CAN . While this structure has offered significant benefits to efficiency safety and cost it has also created the opportunity for new attacks. For example in previous work we demonstrated that an attacker connected to a car s internal network can circumvent all computer control systems including safety critical elements such as the brakes and engine 14 . However the threat model underlying past work including our own has been met with significant and justifiable criticism . 1 3 16 . In .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.