The modern automobile is a complex network of information systems. As the car becomes increasingly computerized, so too does its attack surface increase. With security researchers recently demonstrating a series of vulnerabilities in automotive systems, it is becoming clear that auto manufacturers have not placed enough emphasis on developing secure vehicular information systems. Indeed, the field of automotive systems security is in its infancy. Automakers are struggling to come to grips with the need to secure vehicles’ on-board systems. As a result, the modern passenger vehicle presents an attractive target, with a broad attack surface and a multitude of potential vulnerabilities to exploit. This paper analyzes recent research into automotive security vulnerabilities and reflects on the need for more secure vehicles.
[1]
Alan Burns,et al.
Calculating controller area network (can) message response times
,
1994
.
[2]
Giovanni De Micheli,et al.
Readings in hardware / software co-design
,
2001
.
[3]
Matti Valovirta,et al.
Experimental Security Analysis of a Modern Automobile
,
2011
.
[4]
Hovav Shacham,et al.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
,
2011,
USENIX Security Symposium.
[5]
S. Sen.
CAN Bus
,
2022,
Fieldbus and Networking in Process Automation.
[6]
Neal Langerman,et al.
Defense in Depth
,
2014
.