Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

@article{Sagong2018CloakingTC,
  title={Cloaking the Clock: Emulating Clock Skew in Controller Area Networks},
  author={Sang Uk Sagong and Xuhang Ying and A. Clark and L. Bushnell and R. Poovendran},
  journal={2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)},
  year={2018},
  pages={32-42}
}
  • Sang Uk Sagong, Xuhang Ying, +2 authors R. Poovendran
  • Published 2018
  • Computer Science
  • 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)
  • Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN. [...] Key Method We implement the proposed cloaking attack and test it on two IDSs, namely, the current state-of-the-art IDS and its adaptation to the widely-used Network Time Protocol (NTP). We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle, and show that it is able to deceive both IDSs. We also introduce a…Expand Abstract
    Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks
    • 23
    • PDF
    TACAN: transmitter authentication through covert channels in controller area networks
    • 17
    • PDF
    CANvas: Fast and Inexpensive Automotive Network Mapping
    • 4
    • Highly Influenced
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 25 REFERENCES
    Detection of abrupt changes: theory and application
    • 3,506
    Comprehensive Experimental Analyses of Automotive Attack Surfaces
    • 1,099
    • PDF
    Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
    • 188
    • Highly Influential
    • PDF
    Remote physical device fingerprinting
    • 676
    • PDF
    On calibrating measurements of packet transit times
    • 312
    • PDF
    Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures
    • 319
    • PDF
    On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
    • 120
    • PDF
    An Improved Clock-skew Measurement Technique for Revealing Hidden Services
    • 90
    • PDF
    Entropy-based anomaly detection for in-vehicle networks
    • 162