Telematics: Safe and Fun Driving
IEEE Intelligent Systems
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
BlueSniff: Eve meets Alice and Bluetooth
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Securing vehicles against cyber attacks
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Experimental Security Analysis of a Modern Automobile
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
CarMA: towards personalized automotive tuning
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Tackling vehicular fraud in Ethiopia: from technology to business
Proceedings of the 2nd ACM Symposium on Computing for Development
EDA for secure and dependable cybercars: challenges and opportunities
Proceedings of the 49th Annual Design Automation Conference
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
Computer security and the modern home
Communications of the ACM
Cyber-physical systems: imminent challenges
Proceedings of the 17th Monterey conference on Large-Scale Complex IT Systems: development, operation and management
Proceedings of the 2nd ACM international conference on High confidence networked systems
Proceedings of the 2nd ACM international conference on High confidence networked systems
Security challenges in automotive hardware/software architecture design
Proceedings of the Conference on Design, Automation and Test in Europe
System architecture and software design for electric vehicles
Proceedings of the 50th Annual Design Automation Conference
Security challenges for the intelligent transportation system
Proceedings of the First International Conference on Security of Internet of Things
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
Synthesis of platform-aware attack-resilient vehicular systems
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
Trust assurance levels of cybercars in v2x communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
CPS: an efficiency-motivated attack against autonomous vehicular transportation
Proceedings of the 29th Annual Computer Security Applications Conference
Non-invasive spoofing attacks for anti-lock braking systems
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution
SEC'13 Proceedings of the 22nd USENIX conference on Security
Toward a verifiable software dataplane
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Security-aware mapping for CAN-based real-time distributed automotive systems
Proceedings of the International Conference on Computer-Aided Design
Design synthesis and optimization for automotive embedded systems
Proceedings of the 2014 on International symposium on physical design
Hi-index | 0.02 |
Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model--requiring prior physical access--has justifiably been viewed as unrealistic. Thus, it remains an open question if automobiles can also be susceptible to remote compromise. Our work seeks to put this question to rest by systematically analyzing the external attack surface of a modern automobile. We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft. Finally, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems and highlight the practical challenges in mitigating them.