Adding Cyberattacks To An Industry-Leading CAN Simulator

Jake Hayward, Andrew John Tomlinson, Jeremy Bryans

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Abstract

Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CAN
have been demonstrated, leading to research to develop attack
detection and attack prevention systems. Such research requires
representative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger and
impracticality of using real cars on roads or tracks for example
attacks. Whilst CAN simulators are available, these tend to be
configured for testing conformance and functionality, rather than
analysing security and cyber vulnerability. We therefore adapt a
leading, industry-standard, CAN simulator to incorporate a core
set of cyber attacks that are representative of those proposed by
other researchers. Our adaptation allows the user to configure
the attacks, and can be added easily to the free version of the
simulator. Here we describe the simulator and, after reviewing
the attacks that have been demonstrated and discussing their
commonalities, we outline the attacks that we have incorporated
into the simulator
Original languageEnglish
Title of host publication2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
PublisherIEEE Computer Society
Pages(In-press)
Number of pages8
Volume(In-press)
Publication statusAccepted/In press - 2 Jun 2019
Event19th IEEE International Conference on Software Quality, Reliability and Security - Sofia, Bulgaria
Duration: 22 Jul 201926 Jul 2019
Conference number: 19
https://qrs19.techconf.org/

Conference

Conference19th IEEE International Conference on Software Quality, Reliability and Security
Abbreviated titleQRS 2019
CountryBulgaria
CitySofia
Period22/07/1926/07/19
Internet address

Fingerprint

Simulators
Controllers
Railroad cars
Industry
Railroad tracks
Testing
Demonstrations
Communication

Keywords

  • controller area network
  • automotive cybersecurity
  • in-vehicle network
  • simulation

Cite this

Hayward, J., Tomlinson, A. J., & Bryans, J. (Accepted/In press). Adding Cyberattacks To An Industry-Leading CAN Simulator. In 2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). (Vol. (In-press), pp. (In-press)). IEEE Computer Society.

Adding Cyberattacks To An Industry-Leading CAN Simulator. / Hayward, Jake; Tomlinson, Andrew John; Bryans, Jeremy.

2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).. Vol. (In-press) IEEE Computer Society, 2019. p. (In-press).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Hayward, J, Tomlinson, AJ & Bryans, J 2019, Adding Cyberattacks To An Industry-Leading CAN Simulator. in 2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).. vol. (In-press), IEEE Computer Society, pp. (In-press), 19th IEEE International Conference on Software Quality, Reliability and Security, Sofia, Bulgaria, 22/07/19.
Hayward J, Tomlinson AJ, Bryans J. Adding Cyberattacks To An Industry-Leading CAN Simulator. In 2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).. Vol. (In-press). IEEE Computer Society. 2019. p. (In-press)
Hayward, Jake ; Tomlinson, Andrew John ; Bryans, Jeremy. / Adding Cyberattacks To An Industry-Leading CAN Simulator. 2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).. Vol. (In-press) IEEE Computer Society, 2019. pp. (In-press)
@inproceedings{d1402af2ac0f4b1ba2fcb7a55e3d4ee8,
title = "Adding Cyberattacks To An Industry-Leading CAN Simulator",
abstract = "Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator",
keywords = "controller area network, automotive cybersecurity, in-vehicle network, simulation",
author = "Jake Hayward and Tomlinson, {Andrew John} and Jeremy Bryans",
year = "2019",
month = "6",
day = "2",
language = "English",
volume = "(In-press)",
pages = "(In--press)",
booktitle = "2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Adding Cyberattacks To An Industry-Leading CAN Simulator

AU - Hayward, Jake

AU - Tomlinson, Andrew John

AU - Bryans, Jeremy

PY - 2019/6/2

Y1 - 2019/6/2

N2 - Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator

AB - Recent years have seen an increase in the data usage in cars, particularly as they become more autonomous and connected. With the rise in data use have come concerns about automotive cyber-security. An in-vehicle network shown to be particularly vulnerable is the Controller Area Network (CAN), which is the communication bus used by the car’s safety critical and performance critical components. Cyber attacks on the CANhave been demonstrated, leading to research to develop attackdetection and attack prevention systems. Such research requiresrepresentative attack demonstrations and data for testing. Obtaining this data is problematical due to the expense, danger andimpracticality of using real cars on roads or tracks for exampleattacks. Whilst CAN simulators are available, these tend to beconfigured for testing conformance and functionality, rather thananalysing security and cyber vulnerability. We therefore adapt aleading, industry-standard, CAN simulator to incorporate a coreset of cyber attacks that are representative of those proposed byother researchers. Our adaptation allows the user to configurethe attacks, and can be added easily to the free version of thesimulator. Here we describe the simulator and, after reviewingthe attacks that have been demonstrated and discussing theircommonalities, we outline the attacks that we have incorporatedinto the simulator

KW - controller area network

KW - automotive cybersecurity

KW - in-vehicle network

KW - simulation

M3 - Conference proceeding

VL - (In-press)

SP - (In-press)

BT - 2019 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

PB - IEEE Computer Society

ER -