论文标题

默默地禁用ECU并对罐头巴士进行盲目攻击

Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus

论文作者

Rogers, Matthew, Rasmussen, Kasper

论文摘要

罐头巴士对于现代车辆基础设施的效率和安全至关重要。电子控制单元(ECUS)在共享总线上交换数据,每当发生错误时删除消息。如果ECU产生了足够的错误,则将其发射器放在公交状态下,将其关闭。以前的工作滥用此过程以禁用ECU,但可以通过在总线上传播的多个错误来检测到这一点。我们提出了一种新颖的攻击,无法通过先前的入侵检测系统无法检测到,该系统在单个消息中禁用ECU,而不会在总线上产生任何错误。进行此攻击需要在公共汽车上翻转位的能力,但不具有任何精致的水平。我们表明,只能在40%的时间上翻转攻击的攻击者可以在100%的时间内执行我们的隐秘攻击。但是,这种攻击以及所有先前的攻击都可以依靠阅读公共汽车的能力。我们提出了一种将公共汽车同步的新技术,使得甚至无法阅读公共汽车的盲人攻击者都可以知道何时要传输。从有限的攻击者获得成功的机会,从死亡巴士时间的百分比到100%。最后,我们建议对CAN错误过程进行少量修改,以确保未检测到ECU,无论攻击者有多高级。综上所述,我们提出了罐头攻击和盲目攻击者的艺术状态,同时提出了针对隐形攻击的检测系统,以及CAN滥用错误框架的更大问题。

The CAN Bus is crucial to the efficiency, and safety of modern vehicle infrastructure. Electronic Control Units (ECUs) exchange data across a shared bus, dropping messages whenever errors occur. If an ECU generates enough errors, their transmitter is put in a bus-off state, turning it off. Previous work abuses this process to disable ECUs, but is trivial to detect through the multiple errors transmitted over the bus. We propose a novel attack, undetectable by prior intrusion detection systems, which disables ECUs within a single message without generating any errors on the bus. Performing this attack requires the ability to flip bits on the bus, but not with any level of sophistication. We show that an attacker who can only flip bits 40% of the time can execute our stealthy attack 100% of the time. But this attack, and all prior CAN attacks, rely on the ability to read the bus. We propose a new technique which synchronizes the bus, such that even a blind attacker, incapable of reading the bus, can know when to transmit. Taking a limited attacker's chance of success from the percentage of dead bus time, to 100%. Finally, we propose a small modification to the CAN error process to ensure an ECU cannot fail without being detected, no matter how advanced the attacker is. Taken together we advance the state of the art for CAN attacks and blind attackers, while proposing a detection system against stealthy attacks, and the larger problem of CAN's abusable error frames.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源