Analysis of Typical Attacks on Intelligent and Connected Vehicle Cyber Security
- 20 Downloads
The research on risk attacking and vulnerability mining of vehicle cyber security has been carried out all over the world, and the hidden dangers and problems of cyber security exposed by different types of automobiles have become more and more frequent. How to build an ecological circle of cyber security of the whole automobile industry chain still has a long way to go. This paper takes Ford Winged Tiger as the research object, and makes a detailed analysis of the typical cases of the brake system being attacked. By changing the CAN bus data message, the accelerator pedal will fail, which provides a reference for the management and prevention of the cyber security of intelligent and connected vehicle.
KeywordsIntelligent and connected vehicle Cyber security CAN bus Attacking
This research was supported by the Science and Technology Plan Project of Tianjin, China (17ZXRGGX00070, 18ZLZDZF00390).
- 1.Miller C, Valasek C (2013) Adventures in automotive networks and control units. Def Con 21:260–264Google Scholar
- 2.Miller C, Valasek C (2014) A survey of remote automotive attack surfaces. Black Hat USAGoogle Scholar
- 3.Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USAGoogle Scholar
- 5.Koscher K, Czeskis A, Roesner F, et al (2010) Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP). IEEE, pp 447–462Google Scholar