论文标题
CANFLICT:在汽车网络上利用数据链接层攻击的外围冲突
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
论文作者
论文摘要
从安全角度来看,汽车域中的当前研究证明了CAN协议的局限性。涉及创建恶意数据包的应用层攻击是可行的,但可以通过现代ID轻松检测。另一方面,最近的Link-Layer攻击更加隐形,可能更具破坏性,但需要进行物理访问。在本文中,我们提出了Canflict,这是一种仅软件方法,可以从未修改的微控制器中可靠地操纵CAN BUS,从而克服了最新作品的局限性。我们证明,可以从遥不可及的ECU中部署隐形可以链接层攻击,以同一CAN网络上的另一个ECU为目标。为此,我们利用微控制器外围设备之间存在PIN冲突来制作多面体框架,这使攻击者可以在位级别控制CAN流量并绕过协议规则。我们通过实验证明了方法对高端,中端和低端微控制器的有效性,并通过释放可扩展的工具来为将来的研究提供了基础,该工具可用于在不同平台上实现我们的方法,并可以在数据链路链层上进行对策。
Current research in the automotive domain has proven the limitations of the CAN protocol from a security standpoint. Application-layer attacks, which involve the creation of malicious packets, are deemed feasible from remote but can be easily detected by modern IDS. On the other hand, more recent link-layer attacks are stealthier and possibly more disruptive but require physical access to the bus. In this paper, we present CANflict, a software-only approach that allows reliable manipulation of the CAN bus at the data link layer from an unmodified microcontroller, overcoming the limitations of state-of-the-art works. We demonstrate that it is possible to deploy stealthy CAN link-layer attacks from a remotely compromised ECU, targeting another ECU on the same CAN network. To do this, we exploit the presence of pin conflicts between microcontroller peripherals to craft polyglot frames, which allows an attacker to control the CAN traffic at the bit level and bypass the protocol's rules. We experimentally demonstrate the effectiveness of our approach on high-, mid-, and low-end microcontrollers, and we provide the ground for future research by releasing an extensible tool that can be used to implement our approach on different platforms and to build CAN countermeasures at the data link layer.