scispace - formally typeset
Search or ask a question
Author

Alessio Buscemi

Bio: Alessio Buscemi is an academic researcher from University of Luxembourg. The author has contributed to research in topics: Computer science & CAN bus. The author has an hindex of 1, co-authored 2 publications receiving 1 citations.

Papers
More filters
Proceedings ArticleDOI
01 Nov 2020
TL;DR: This paper presents a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle.
Abstract: Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity – keep the proprietary format used to encode the information secret. However, it is still possible to decode this information via reverse engineering. Existing reverse engineering methods typically require physical access to the vehicle and are time consuming. In this paper, we present a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle. Our results demonstrate high accuracy in identifying critical vehicle functions just from analysing raw traces of CAN data.

3 citations

Proceedings ArticleDOI
26 Apr 2023
TL;DR: In this article , the authors reveal a critical vulnerability caused by a common implementation practice that opens the door to spoofing attacks on Generalized Precision Time Protocol (gPTP) and assess the impact of this vulnerability.
Abstract: Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among these standards, Generalized Precision Time Protocol (gPTP) - IEEE 802.1AS - allows network devices to be synchronized with a precision far higher than other synchronization standards, such as Network Time Protocol (NTP). gPTP is a profile of Precision Time Protocol (PTP) which, due to its robustness to delay variations, has been designated for automotive applications. Nonetheless, gPTP was designed without security controls, which makes it vulnerable to a number of attacks. This work reveals a critical vulnerability caused by a common implementation practice that opens the door to spoofing attacks on gPTP. To assess the impact of this vulnerability, we built two real gPTP-capable testbeds. Our results show high risks of this vulnerability destabilizing the system functionality.
Proceedings ArticleDOI
08 Jan 2022
TL;DR: In this paper , the authors investigated whether anonymizing the frames of each newly released vehicle is sufficient to prevent CAN bus reverse-engineering based on frame ID matching, and they showed that, by adopting Machine Learning techniques, anonymized CAN frames can still be fingerprinted and identified in an unknown vehicle with an accuracy of up to 80 %.
Abstract: Modern connected vehicles are equipped with a large number of sensors, which enable a wide range of services that can improve overall traffic safety and efficiency. However, remote access to connected vehicles also introduces new security issues affecting both inter and intra-vehicle communications. In fact, existing intra-vehicle communication systems, such as Controller Area Network (CAN), lack security features, such as encryption and secure authentication for Electronic Control Units (ECUs). Instead, Original Equipment Manufacturers (OEMs) seek security through obscurity by keeping secret the proprietary format with which they encode the information. Recently, it has been shown that the reuse of CAN frame IDs can be exploited to perform CAN bus reverse engineering without physical access to the vehicle, thus raising further security concerns in a connected environment. This work investigates whether anonymizing the frames of each newly released vehicle is sufficient to prevent CAN bus reverse engineering based on frame ID matching. The results show that, by adopting Machine Learning techniques, anonymized CAN frames can still be fingerprinted and identified in an unknown vehicle with an accuracy of up to 80 %.
Proceedings ArticleDOI
16 May 2022
TL;DR: The results show that the proposed methodology halves the accuracy of CAN frame fingerprinting, which allows fully remote decoding of in-vehicle data and paves the way for remote pre-compiled vehicle-agnostic attacks.
Abstract: The continuous increase of connectivity in commercial vehicles is leading to a higher number of remote access points to the Controller Area Network (CAN) - the most popular in-vehicle network system. This factor, coupled with the absence of encryption in the communication protocol, poses serious threats to the security of the CAN bus. Recently, it has been demonstrated that CAN data can be reverse engineered via frame fingerprinting, i.e., identification of frames based on statistical traffic analysis. Such a methodology allows fully remote decoding of in-vehicle data and paves the way for remote pre-compiled vehicle-agnostic attacks. In this work, we propose a first solution against CAN frame fingerprinting based on mutating the traffic without applying modifications to the CAN protocol. The results show that the proposed methodology halves the accuracy of CAN frame fingerprinting.

Cited by
More filters
Journal ArticleDOI
27 Jan 2022-Sensors
TL;DR: This study proposes multiple linear regression-based frameworks for bit-level inversion of CAN messages that can approximate the inversions of DBC files and shows that the system has high reversion accuracy and outperforms existing systems in boundary delineation and filtering relevant messages in actual vehicles.
Abstract: Modern intelligent and networked vehicles are increasingly equipped with electronic control units (ECUs) with increased computing power. These electronic devices form an in-vehicle network via the Controller Area Network (CAN) bus, the de facto standard for modern vehicles. Although many ECUs provide convenience to drivers and passengers, they also increase the potential for cyber security threats in motor vehicles. Numerous attacks on vehicles have been reported, and the commonality among these attacks is that they inject malicious messages into the CAN network. To close the security holes of CAN, original equipment manufacturers (OEMs) keep the Database CAN (DBC) file describing the content of CAN messages, confidential. This policy is ineffective against cyberattacks but limits in-depth investigation of CAN messages and hinders the development of in-vehicle intrusion detection systems (IDS) and CAN fuzz testing. Current research reverses CAN messages through tokenization, machine learning, and diagnostic information matching to obtain details of CAN messages. However, the results of these algorithms yield only a fraction of the information specified in the DBC file regarding CAN messages, such as field boundaries and message IDs associated with specific functions. In this study, we propose multiple linear regression-based frameworks for bit-level inversion of CAN messages that can approximate the inversion of DBC files. The framework builds a multiple linear regression model for vehicle behavior and CAN traffic, filters the candidate messages based on the decision coefficients, and finally locates the bits describing the vehicle behavior to obtain the data length and alignment based on the model parameters. Moreover, this work shows that the system has high reversion accuracy and outperforms existing systems in boundary delineation and filtering relevant messages in actual vehicles.

5 citations

Journal ArticleDOI
TL;DR: This paper presents CANClassify — a method that takes in raw CAN bus data, and automatically decodes and labels CAN bus signals, using a novel convolutional interpretation method to preprocess CAN messages.
Abstract: : Controller Area Network (CAN) bus data is used on most vehicles today to report and communicate sensor data. However, this data is generally encoded and is not directly interpretable by simply viewing the raw data on the bus. However, it is possible to decode CAN bus data and reverse engineer the encodings by leveraging knowledge about how signals are encoded and using independently recorded ground-truth signal values for correlation. While methods exist to support the decoding of possible signals, these methods often require additional manual work to label the function of each signal. In this paper, we present CANClassify — a method that takes in raw CAN bus data, and automatically decodes and labels CAN bus signals, using a novel convolutional interpretation method to preprocess CAN messages. We evaluate CANClassify’s performance on a previously undecoded vehicle and confirm the encodings manually. We demonstrate performance comparable to the state of the art while also providing automated labeling. Examples and code are available at https://github.com/ngopaul/CANClassify .

2 citations

Journal ArticleDOI
TL;DR: In this article , a data-driven method was proposed to estimate the prevailing tire-pavement grip potential from vehicle vibrations recorded during normal/regular usage of the infrastructure, based on the underlying premise that transverse vehicle accelerations are related to wheel side-force oscillations, and therefore carry information related to the ride surface texture.
Abstract: This study was motivated by the desire to provide highway managers/operators with more frequent and spatially dense information about the prevailing friction conditions in their networks. A new data-driven method was outlined for this purpose, wherein the prevailing tire–pavement grip potential is estimated from vehicle vibrations recorded during normal/regular usage of the infrastructure. The method was based on the underlying premise that transverse vehicle accelerations are related to wheel side-force oscillations, and therefore carry information related to the ride surface texture. It involved performing a short-time Fourier transform over vibration signals and analyzing the resulting spectral amplitudes. Two field experiments were carried out to validate the method. The first provided evidence of a statistical link between transverse vehicle vibrations and wheel side-force oscillations. The second tested the statistical link between skid resistance measured over a 26 km highway section and corresponding skid resistance estimations based on vehicle vibration data. Overall, transverse vehicle vibration characteristics were found to hold relevant information about the prevailing tire–pavement grip potential; the two were moderately inter-correlated. The newly proposed estimation method seems promising and potentially useful for pavement management applications, especially when considering the emergence of connected car technologies and the increased availability (and affordability) of in-vehicle Internet of Things devices.

1 citations

Journal ArticleDOI
TL;DR: In this article , Sun et al. designed a frame structure with 48 frames in one superframe, where each frame shares overhead symbols in the superframe and the length of each frame is 1/48 of the super-frame length and is equal to 20.833 μs.