Reference : A Car Hacking Experiment: When Connectivity meets Vulnerability
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/23592
A Car Hacking Experiment: When Connectivity meets Vulnerability
English
Jafarnejad, Sasan mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Codeca, Lara mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Bronzi, Walter mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Frank, Raphaël mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Engel, Thomas mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Dec-2015
Globecom Workshops (GC Wkshps), 2015 IEEE
IEEE
Yes
International
978-1-4673-9526-7
IEEE Globecom 2015 Workshop on Wireless Networking, Control & Positioning for Unmanned Autonomous Vehicles
from 6-12-2015 to 10-12-2015
San Diego
CA
[en] Automotive Security ; Car Hacking ; Security Vulnerability
[en] Interconnected vehicles are a growing commodity providing remote access to on-board systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen the owner’s knowledge about its car but at the same time they impact its safety and security. Vehicles are not ready to be fully connected as various attacks are currently possible against their control systems. In this paper, we analyse possible attack scenarios on a recently released all-electric car and investigate their impact on real life driving scenarios. We leverage our findings to change the behaviour of safety critical components of the vehicle in order to achieve autonomous driving using an Open Vehicle Monitoring System. Furthermore, to demonstrate the potential of our setup, we developed a novel mobile application able to control such vehicle systems remotely through the Internet. We challenge the current state-of-the-art technology in today’s vehicles and provide a vulnerability analysis on modern embedded systems.
http://hdl.handle.net/10993/23592
10.1109/GLOCOMW.2015.7413993
http://ieeexplore.ieee.org/document/7413993/

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
07413993.pdfPublisher postprint861.21 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.