File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

전유석

Jeon, Yuseok
Secure Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace JA -
dc.citation.endPage 545 -
dc.citation.startPage 534 -
dc.citation.title ACM Asia Conference on Computer and Communications Security -
dc.contributor.author Kim, Sungwoo -
dc.contributor.author Yeo, Gisu -
dc.contributor.author Kim, Taegyu -
dc.contributor.author Rhee, Junghwan "John" -
dc.contributor.author Jeon, Yuseok -
dc.contributor.author Bianchi, Antonio -
dc.contributor.author Xu, Dongyan -
dc.contributor.author Tian, Dave Jing -
dc.date.accessioned 2024-01-31T20:11:22Z -
dc.date.available 2024-01-31T20:11:22Z -
dc.date.created 2023-12-15 -
dc.date.issued 2022-05-30 -
dc.description.abstract Controller Area Network (CAN) is the de-facto standard in-vehicle network system. Despite its wide adoption by automobile manufacturers, the lack of security design makes it vulnerable to attacks. For instance, broadcasting packets without authentication allows the impersonation of electronic control units (ECUs). Prior mitigations, such as message authentication or intrusion detection systems, fail to address the compatibility requirement with legacy ECUs, stealthy and sporadic malicious messaging, or guaranteed attack detection. We propose a novel authentication system called ShadowAuth that overcomes the aforementioned challenges by offering backwardcompatible packet authentication to ECUs without requiring ECU firmware source code. Specifically, our authentication scheme provides transparent CAN packet authentication without modifying existing CAN packet definitions (e.g., J1939) via automatic ECU firmware instrumentation technique to locate CAN packet transmission code, and instrument authentication code based on the CAN packet behavioral transmission patterns. ShadowAuth enables vehicles to detect state-of-the-art CAN attacks, such as busoff and packet injection, responsively within 60ms without false positives. ShadowAuth provides a sound and deployable solution for real-world ECUs. -
dc.identifier.bibliographicCitation ACM Asia Conference on Computer and Communications Security, pp.534 - 545 -
dc.identifier.doi 10.1145/3488932.3523263 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/75862 -
dc.language 영어 -
dc.publisher Association for Computing Machinery, Inc -
dc.title ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs -
dc.type Conference Paper -
dc.date.conferenceDate 2022-05-30 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.