Adding Cyberattacks To An Industry-Leading CAN Simulator

Jake Hayward, Andrew John Tomlinson, Jeremy Bryans

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

1 Downloads (Pure)

Abstract

Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CAN
have been demonstrated, leading to research to develop attack
detection and attack prevention systems. Such research requires
representative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger and
impracticality of using real cars on roads or tracks for example
attacks. Whilst CAN simulators are available, these tend to be
configured for testing conformance and functionality, rather than
analysing security and cyber vulnerability. We therefore adapt a
leading, industry-standard, CAN simulator to incorporate a core
set of cyber attacks that are representative of those proposed by
other researchers. Our adaptation allows the user to configure
the attacks, and can be added easily to the free version of the
simulator. Here we describe the simulator and, after reviewing
the attacks that have been demonstrated and discussing their
commonalities, we outline the attacks that we have incorporated
into the simulator
Original languageEnglish
Title of host publicationProceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019
PublisherIEEE Computer Society
Pages9-16
Number of pages8
ISBN (Electronic)978-1-7281-3925-8
DOIs
Publication statusPublished - 7 Oct 2019
Event19th IEEE International Conference on Software Quality, Reliability and Security - Sofia, Bulgaria
Duration: 22 Jul 201926 Jul 2019
Conference number: 19
https://qrs19.techconf.org/

Conference

Conference19th IEEE International Conference on Software Quality, Reliability and Security
Abbreviated titleQRS 2019
CountryBulgaria
CitySofia
Period22/07/1926/07/19
Internet address

Fingerprint

Simulators
Controllers
Railroad cars
Industry
Railroad tracks
Testing
Demonstrations
Communication

Keywords

  • automotive cybersecurity
  • controller area network
  • in-vehicle network
  • simulation

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Law
  • Artificial Intelligence
  • Computer Networks and Communications
  • Software

Cite this

Hayward, J., Tomlinson, A. J., & Bryans, J. (2019). Adding Cyberattacks To An Industry-Leading CAN Simulator. In Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019 (pp. 9-16). [8859515] IEEE Computer Society. https://doi.org/10.1109/QRS-C.2019.00016

Adding Cyberattacks To An Industry-Leading CAN Simulator. / Hayward, Jake; Tomlinson, Andrew John; Bryans, Jeremy.

Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019. IEEE Computer Society, 2019. p. 9-16 8859515.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Hayward, J, Tomlinson, AJ & Bryans, J 2019, Adding Cyberattacks To An Industry-Leading CAN Simulator. in Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019., 8859515, IEEE Computer Society, pp. 9-16, 19th IEEE International Conference on Software Quality, Reliability and Security, Sofia, Bulgaria, 22/07/19. https://doi.org/10.1109/QRS-C.2019.00016
Hayward J, Tomlinson AJ, Bryans J. Adding Cyberattacks To An Industry-Leading CAN Simulator. In Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019. IEEE Computer Society. 2019. p. 9-16. 8859515 https://doi.org/10.1109/QRS-C.2019.00016
Hayward, Jake ; Tomlinson, Andrew John ; Bryans, Jeremy. / Adding Cyberattacks To An Industry-Leading CAN Simulator. Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019. IEEE Computer Society, 2019. pp. 9-16
@inproceedings{d1402af2ac0f4b1ba2fcb7a55e3d4ee8,
title = "Adding Cyberattacks To An Industry-Leading CAN Simulator",
abstract = "Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator",
keywords = "automotive cybersecurity, controller area network, in-vehicle network, simulation",
author = "Jake Hayward and Tomlinson, {Andrew John} and Jeremy Bryans",
year = "2019",
month = "10",
day = "7",
doi = "10.1109/QRS-C.2019.00016",
language = "English",
pages = "9--16",
booktitle = "Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Adding Cyberattacks To An Industry-Leading CAN Simulator

AU - Hayward, Jake

AU - Tomlinson, Andrew John

AU - Bryans, Jeremy

PY - 2019/10/7

Y1 - 2019/10/7

N2 - Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator

AB - Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator

KW - automotive cybersecurity

KW - controller area network

KW - in-vehicle network

KW - simulation

UR - http://www.scopus.com/inward/record.url?scp=85073878367&partnerID=8YFLogxK

U2 - 10.1109/QRS-C.2019.00016

DO - 10.1109/QRS-C.2019.00016

M3 - Conference proceeding

SP - 9

EP - 16

BT - Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019

PB - IEEE Computer Society

ER -