A taxonomy of attack mechanisms in the automotive domain

Abstract In the last decade, the automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. In comparison to older types of vehicles, where the biggest concern was physical security, modern vehicles might be targeted remotely. As a result, multiple attack vectors aiming to disrupt different vehicle components emerged. Research and practice lack a comprehensive attack taxonomy for the automotive domain. In this regard, we conduct a systematic literature study, wherein 48 different attacks were identified and classified according to the proposed taxonomy of attack mechanisms. The taxonomy can be utilized by penetration testers in the automotive domain as well as to develop more sophisticated attacks by chaining multiple attack vectors together. In addition, we classify the identified attack vectors based on the following five dimensions: (1) AUTOSAR layers, (2) attack domains, (3) information security principles, (4) attack surfaces, and (5) attacker profile. The results indicate that the most applied attack vectors identified in literature are GPS spoofing, message injection, node impersonation, sybil, and wormhole attack, which are mostly applied to application and services layers of the AUTOSAR architecture.

[1]  Andrei Vladyko,et al.  Forecasting Issues of Wireless Communication Networks' Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks , 2019, Inf..

[2]  Wenyuan Xu,et al.  DolphinAttack: Inaudible Voice Commands , 2017, CCS.

[3]  Kang G. Shin,et al.  Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.

[4]  Qishi Wu,et al.  AVOIDIT: A Cyber Attack Taxonomy , 2009 .

[5]  Prathyush P. Menon,et al.  Analysis of Automotive Cyber-Attacks on Highways Using Partial Differential Equation Models , 2018, IEEE Transactions on Control of Network Systems.

[6]  Ina Schieferdecker,et al.  A taxonomy of risk-based testing , 2014, International Journal on Software Tools for Technology Transfer.

[7]  Pascal Urien Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[8]  Yuanchao Shu,et al.  A Practical GPS Location Spoofing Attack in Road Navigation Scenario , 2017, HotMobile.

[9]  Shalini Stalin,et al.  Analysis of Attacks and Challenges in VANET , 2014 .

[10]  Zhuo Lu,et al.  On modeling and understanding vehicle evacuation attacks in VANETs , 2017, 2017 IEEE International Conference on Communications (ICC).

[11]  Prateek Mittal,et al.  DARTS: Deceiving Autonomous Cars with Toxic Signs , 2018, ArXiv.

[12]  Elyes Ben Hamida,et al.  Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .

[13]  Kai Petersen,et al.  Worldviews, Research Methods, and their Relationship to Validity in Empirical Software Engineering Research , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.

[14]  Qian Wang,et al.  Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).

[15]  Rakesh Kumar,et al.  VANET security: Issues, challenges and solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[16]  Martin Mullins,et al.  Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.

[17]  Farhan Ahmad,et al.  A systematic approach for cyber security in vehicular networks , 2016 .

[18]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[19]  Ruth Breu,et al.  Security Testing: A Survey , 2016, Adv. Comput..

[20]  Tobias Hoppe,et al.  Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats , 2009, SAFECOMP.

[21]  Ruth Breu,et al.  Model‐based security testing: a taxonomy and systematic classification , 2016, Softw. Test. Verification Reliab..

[22]  Alexandre M. Bayen,et al.  Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security , 2016 .

[23]  Stefano Zanero,et al.  A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks , 2017, DIMVA.

[24]  Vinh Hoa La,et al.  SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .

[25]  M. Yampolskiy,et al.  In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions , 2015, CISR.

[26]  Claes Wohlin,et al.  Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.

[27]  Jana Dittmann,et al.  Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[28]  Levente Buttyán,et al.  Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[29]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[30]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[31]  Roberto Di Pietro,et al.  Key is in the Air: Hacking Remote Keyless Entry Systems , 2018, ISSA/CSITS@ESORICS.

[32]  Mohammad Samie,et al.  Hardware trojan enabled denial of service attack on CAN bus , 2018 .

[33]  Mohammad Zulkernine,et al.  Towards defending connected vehicles against attacks , 2017, ECBS.

[34]  Gang Wang,et al.  All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.

[35]  Xiang Li,et al.  Controlling a Car Through OBD Injection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[36]  Michael Felderer,et al.  Applying Security Testing Techniques to Automotive Engineering , 2019, ARES.

[37]  Stacy J. Prowell,et al.  Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection , 2017, CISRC.

[38]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[39]  Indrakshi Ray,et al.  Practical DoS Attacks on Embedded Networks in Commercial Vehicles , 2016, ICISS.

[40]  Jason Andress The basics of information security - understanding the fundamentals of InfoSec in theory and practice, Second edition , 2011 .

[41]  Lilian Bossuet,et al.  JTAG Combined Attack - Another Approach for Fault Injection , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[42]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.

[43]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[44]  Bernd Eissfeller,et al.  Emerging attacks on VANET security based on GPS Time Spoofing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[45]  Jill Slay,et al.  A new approach to developing attack taxonomies for network security - including case studies , 2011, 2011 17th IEEE International Conference on Networks.

[46]  Falko Dressler,et al.  The scrambler attack: A robust physical layer attack on location privacy in vehicular networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[47]  Hirofumi Yamashita,et al.  Automotive Attacks and Countermeasures on LIN-Bus , 2017, J. Inf. Process..

[48]  Bo Xu,et al.  VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs , 2015, ICA3PP.

[49]  Umesh Singh,et al.  ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies , 2014 .

[50]  Kim-Kwang Raymond Choo,et al.  Cloud Attack and Risk Assessment Taxonomy , 2015, IEEE Cloud Computing.

[51]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[52]  Tatsuya Mori,et al.  Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams , 2018, CCS.

[53]  Mario Gerla,et al.  BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs , 2018, 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC).

[54]  Florian Sommer,et al.  Survey and Classification of Automotive Security Attacks , 2019, Inf..

[55]  Flavio D. Garcia,et al.  Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.

[56]  Tao Zhang,et al.  Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.

[57]  Lynn Batten,et al.  Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..

[58]  Xiaodong Lin,et al.  DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation , 2019, IEEE Transactions on Vehicular Technology.

[59]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[60]  Lei Wang,et al.  Trajectory tracking and recovery attacks in VANET systems , 2018, Int. J. Commun. Syst..

[61]  André Weimerskirch,et al.  Truck Hacking: An Experimental Analysis of the SAE J1939 Standard , 2016, WOOT.

[62]  Huirong Fu,et al.  T-PAAD: Trajectory Privacy Attack on Autonomous Driving , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[63]  Bin Pang,et al.  Research of the interest packet popple broadcast diffusion attack in NDN VANET , 2017, SAC.

[64]  R.S.H. Piggin,et al.  Safety and security - a story of interdependence , 2015 .

[65]  Jain-Shing Wu,et al.  Designing a Taxonomy of Web Attacks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[66]  Sandro Schulze,et al.  IT Security in Automotive Software Development , 2009, Softwaretechnik-Trends.

[67]  Thomas Engel,et al.  A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[68]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[69]  Emilia Mendes,et al.  Taxonomies in software engineering: A Systematic mapping study and a revised taxonomy development method , 2017, Inf. Softw. Technol..

[70]  Pearl Brereton,et al.  Systematic literature reviews in software engineering - A systematic literature review , 2009, Inf. Softw. Technol..

[71]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[72]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[73]  Qassim Nasir,et al.  Systematic literature review on Internet-of-Vehicles communication security , 2018, Int. J. Distributed Sens. Networks.

[74]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.

[75]  Mario Gerla,et al.  Congestion Attacks to Autonomous Cars Using Vehicular Botnets , 2015 .