Doctoral thesis (Dissertations and theses)
Automation of Controller Area Network Reverse Engineering: Approaches, Opportunities and Security Threats
Buscemi, Alessio
2022
 

Files


Full Text
Thesis.pdf
Author preprint (3.1 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Controller Arean Network; Reverse Engineering; Machine Learning; Cybersecurity
Abstract :
[en] Controller Area Network (CAN ) is the de-facto in-vehicle communication system in the automotive industry today. CAN data represents a valuable source of information regarding the vehicle, which can be exploited for a multitude of purposes by aftermarket companies, from fleet management to infotainment. With the rise of Vehicular Ad Hoc Networks (VANETs) and autonomous driving, we can expect the amount of data transiting on the CAN bus to further augment in the near future. While not encrypted, the communication inside the CAN bus is typically encoded using proprietary formats of the Original Equipment Manufacturers (OEM s) in order to prevent easy access to the information exchanged on the network. However, given the unwillingness of the OEM s to disclose the formats of most of the CAN signals of commercial vehicles (cars in particular) to the general public, the most common way to obtain such information is through reverse engineering. Recently, researchers have started investigating the automation of this process to make it faster, scalable and standardised. Aside from the evident advantages that it would bring to the industry, the automation of CAN bus reverse engineering has also gained interest in the scientific community, where automotive cybersecurity is a prominent topic. While achieving convincing results, the automation of CAN reverse engineering is still invasive, often includes complex hardware configurations or requires the presence of a human operator in the vehicle. This dissertation aims to analyse the main advancements achieved in the field of CAN bus reverse engineering and shed light on open issues. In the first part of this dissertation, we explore opportunities and challenges of the automation of CAN bus reverse engineering and present three approaches that achieve different degrees of automation. The first, FastCAN, is based on the taxonomy of signals. Its goal is to provide a complete, standardised and modular pipeline for semi-automated reverse engineering and reduce the total time for data collection. The second, CSI, is a Machine Learning (ML )-based algorithm for the identification of critical signals working under limited assumptions. We use CSI as a case study to investigate whether CAN reverse engineering can be achieved with no other hardware than a dongle for the collection of raw data. The third, CANMatch, is a complete and fully automated approach based on frame matching. Through CANMatch we seek to demonstrate that the reuse of CAN frame IDs can be exploited to reverse engineer a high number of signals with minimal hardware requirements and human effort. In the second part of this dissertation, we discuss the implications that the full automation of the reverse engineering process has on the security of the bus. In this context, we investigate whether the anonymisation of the CAN frame IDs is sufficient to prevent frame-matching based reverse engineering. The results highlight that ML models can fingerprint CAN frames despite the anonymisation of their IDs. Finally, we propose a defence against frame fingerprinting based on traffic mutations, such as padding on the payload and morphing on the sending frequency. We conclude that traffic mutations are a promising study direction to prevent frame-matching based reverse engineering.
Disciplines :
Computer science
Author, co-author :
Buscemi, Alessio ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Language :
English
Title :
Automation of Controller Area Network Reverse Engineering: Approaches, Opportunities and Security Threats
Defense date :
04 March 2022
Number of pages :
184
Institution :
Unilu - University of Luxembourg, Luxembourg
Degree :
Docteur de l’Université du Luxembourg en Sciences de l’Ingeniéur
Promotor :
Panchenko, Andriy
Engel, Thomas 
President :
Jury member :
Shin, Kang
Dressler, Falko
Funders :
FNR - Fonds National de la Recherche [LU]
Available on ORBilu :
since 13 April 2022

Statistics


Number of views
468 (47 by Unilu)
Number of downloads
160 (14 by Unilu)

Bibliography


Similar publications



Contact ORBilu