ACTT: Automotive CAN Tokenization and Translation

@article{Verma2018ACTTAC,
  title={ACTT: Automotive CAN Tokenization and Translation},
  author={Miki E. Verma and Robert A. Bridges and Samuel C. Hollifield},
  journal={2018 International Conference on Computational Science and Computational Intelligence (CSCI)},
  year={2018},
  pages={278-283}
}
Modern vehicles contain scores of Electrical Control Units (ECUs) that broadcast messages over a Controller Area Network (CAN). Vehicle manufacturers rely on security through obscurity by concealing their unique mapping of CAN messages to vehicle functions which differs for each make, model, year, and even trim. This poses a major obstacle for after-market modifications notably performance tuning and in-vehicle network security measures. We present ACTT: Automotive CAN Tokenization and… Expand
LibreCAN: Automated CAN Message Translator
Modern Connected and Autonomous Vehicles (CAVs) are equipped with an increasing number of Electronic Control Units (ECUs), many of which produce large amounts of data. Data is exchanged between ECUsExpand
Towards Reverse Engineering Controller Area Network Messages Using Machine Learning
TLDR
This work examines CAN traffic of different vehicles and standards to show that it can be applied to a wide arrangement of vehicles and shows that the function of CAN messages can be determined without the need to manually reverse engineer a physical vehicle. Expand
A Data-Driven Minimal Approach for CAN Bus Reverse Engineering
TLDR
This paper presents a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle. Expand
Reverse Engineering Controller Area Network Messages using Unsupervised Machine Learning
TLDR
This work describes an approach to help reduce the complexity of security analyses by leveraging unsupervised machine learning to learn clusters of messages passed between ECUs that correlate with changes in the CPS state of a vehicle as it moves throughout the world. Expand
Towards a CAN IDS Based on a Neural Network Data Field Predictor
TLDR
Initial IDS results testing deep neural networks used to predict CAN data at the bit level are presented, targeting IDS capabilities that avoiding reverse engineering proprietary encodings. Expand
Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network
TLDR
A dynamic identifier (ID) virtualization method is proposed that prevents CAN logs from being analyzed and makes it difficult for attackers to generate valid messages. Expand
Discovering CAN Specification Using On-Board Diagnostics
TLDR
The work presented in this article leverages on-board diagnostics for reverse-engineering CAN traffic data and can be utilized to improve in- vehicle network security. Expand
Sensor-Based Extraction Approaches of In-Vehicle Information for Driver Behavior Analysis
TLDR
This paper presents a system for the automatic extraction of proprietary in-vehicle information using sensor data correlated with the desired information using inertial measurement unit and global positioning system values. Expand
An Approach to Exonerate Innocent Suspects in Hit-And-Run Accidents via Route Reconstruction
  • Marian Waltereit, Torben Weis
  • Computer Science
  • 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
  • 2019
TLDR
An algorithm is developing an algorithm that automatically reconstructs the routes traveled by suspect drivers using vehicle data recorded while driving that helps wrongly suspected drivers to support their innocence and eases the investigation of hit-and-run accidents. Expand
On the Digital Forensic Investigation of Hit-And-Run Accidents
TLDR
An algorithm that reconstructs the likely traveled routes of a driver by mapping the distances and turns caused by traveling the actual route onto the street network of the area in which the trip took place is introduced and can be used to discover risky driving maneuvers at any point of a trip. Expand
...
1
2
...

References

SHOWING 1-10 OF 17 REFERENCES
READ: Reverse Engineering of Automotive Data Frames
TLDR
Experimental results based on CAN traffic gathered from a licensed unmodified vehicle and validated against its complete formal specifications demonstrate that the proposed algorithm can extract and classify more than twice the signals with respect to the previous related work. Expand
Automating ECU Identification for Vehicle Security
TLDR
This work aims to automate the process of correlating CAN bus messages with specific Electronic Control Unit (ECU) functions in a new vehicle, by creating a machine learning classifier that has been trained on a dataset of multiple vehicles from different manufacturers. Expand
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks
TLDR
This paper proposes a novel identification method, which works in the physical layer of the in-vehicle CAN network, and identifies electronic control units (ECUs) using inimitable characteristics of electrical CAN signals enabling detection of a malicious ECU. Expand
Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection
TLDR
This work presents a transformational approach to CAN IDS that exploits the geometric properties of CAN data to inform two novel detectors - one based on distance from a learned, lower dimensional manifold and the other on discontinuities of the manifold over time. Expand
Unsupervised Time Series Extraction from Controller Area Network Payloads
TLDR
This paper introduces a method for unsupervised tokenization of Controller Area Network data payloads using bit level transition analysis and a greedy grouping strategy to extract individual time series which have been concatenated together before transmission onto a vehicle's CAN bus. Expand
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
TLDR
An anomaly-based intrusion detection system (IDS), called Clock-based IDS (CIDS), which measures and then exploits the intervals of periodic in-vehicle messages for fingerprinting ECUs and facilitates a rootcause analysis; identifying which ECU mounted the attack. Expand
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection
TLDR
This paper provides the first such algorithm with experiments using three attacks in five (total) scenarios, and requires only five seconds of training time, and achieves true positive / false discovery rates of 0.9998/0.00298. Expand
POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration
TLDR
This paper presents an Intrusion Detection System (IDS) based on a regression learning approach which estimates certain parameters by using correlated/redundant data to identify abnormal contexts that would indicate intrusion. Expand
Field classification, modeling and anomaly detection in unknown CAN bus networks
TLDR
A novel domain-aware anomaly detection system for in-car CAN bus traffic that detects semantically-meaningful Constant fields, Multi-Value fields and Counter or Sensor fields through inspection of real CAN bus communication. Expand
Using Data Analytics to Detect Anomalous States in Vehicles
TLDR
A Hidden Markov Model is developed to detect anomalous states from real data collected from vehicles and could be integrated as a plug-n-play device in all new and old cars. Expand
...
1
2
...