automobile intrusion detection - cansecwest. karl koscher, alexei czeskis, experimental security...
TRANSCRIPT
![Page 1: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/1.jpg)
Jun Li Twitter:@bravo_fighter UnicornTeam Qihoo360
Automobile Intrusion Detection
![Page 2: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/2.jpg)
2
What this talk is about?
Automotive intrusion detection Automotive cyber-security architecture
![Page 3: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/3.jpg)
3From the highest viewpointJ
![Page 4: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/4.jpg)
Outline
• Quick recap of the status quo of car security research
• Little automobile working principle • CAN bus anomaly detection
![Page 5: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/5.jpg)
Performance Tuning by modifying firmware
Immobilizer Cracking (Hitag,Keeloq)
DARPA&UW OBD interface attack,etc. Karl et al.
Remote attack via wireless OBD interface
Telsa Qihoo360
BMW ConnectedDrive
vuln
Mbrace Jeep Uconnect Charlie&Chris
GM Onstar Vuln,Sammy More to
come ? Sure!
Car hacking development
![Page 6: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/6.jpg)
Car explained
![Page 7: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/7.jpg)
Sensor security
![Page 8: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/8.jpg)
In automotive electronics, Electronic Control Unit (ECU) is a generic term for any secret system that controls one or more of the electrical system or subsystems in a transport vehicle Types of ECU include Electronic/engine Control Module (ECM), Powertrain Control Module (PCM), Transmission Control Module (TCM), Brake Control Module (BCM or EBCM), Central Control Module (CCM), Central Timing Module (CTM), General Electronic Module (GEM), Body Control Module (BCM), Suspension Control Module (SCM), control unit, or control module
ECU (Electronic Control Unit)
![Page 9: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/9.jpg)
Electronic Control Module Example 9
![Page 10: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/10.jpg)
Automotive Mechatronics 10
![Page 11: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/11.jpg)
Non-hackable hackable
11
Throttle position sensor
Drive-by-wire system
![Page 12: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/12.jpg)
12
Steering-by-wire system
Universal joint
Steer-by –wire (with mechanical fallback clutch)
![Page 13: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/13.jpg)
Automotive Control System Architecture
![Page 14: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/14.jpg)
Vehicle CAN BUS System
![Page 15: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/15.jpg)
Vehicle Communication System
OBDII
MOST LIN CAN FlexRay Bluetooth Wifi SubGHz
Infotainment System
![Page 16: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/16.jpg)
ESP TCU ACC
ESP(electronic stability program)
TCU(transmission control unit)
ACC(adaptive cruise control)
… CAN-C
网关
Speedometer
CAN-B
Infotainment System
Music Player
INS(Inertial navigation system)
INS
EMU
EMU(engine management system)
Seat Controller
Vehicle Communication System example
![Page 17: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/17.jpg)
CAN BUS Signaling
![Page 18: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/18.jpg)
CAN Frame Structure
![Page 19: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/19.jpg)
0 dominant 1 recessive
1 1 1
1
0 1
1
1
1 0
0
0
1
1
1 0 0
0 0
0 0
CAN Bus Access Arbitration
![Page 20: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/20.jpg)
Packets injection Parameter spoofing
CAN BUS Attack
![Page 21: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/21.jpg)
Jeep Uconnect Vulnerability
WiFi femotocell Sprint Internet CAN
Remote Attack Example
![Page 22: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/22.jpg)
![Page 23: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/23.jpg)
![Page 24: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/24.jpg)
Automotive intrusion detection researches
![Page 25: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/25.jpg)
Automotive intrusion detection researches
Not considering Temporal feature
![Page 26: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/26.jpg)
![Page 27: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/27.jpg)
Distributed architecture
![Page 28: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/28.jpg)
CAN总线安全防御模型
IDS
IDS(Intrusion Detection System)
![Page 29: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/29.jpg)
① Real time requirements② Hard to trace back to sender③ High cost of false positive④ …
Difficulties of CAN bus defence
![Page 30: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/30.jpg)
CAN Anomaly Detection McAfee&Intel
![Page 31: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/31.jpg)
CAN bus defence
IDS
![Page 32: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/32.jpg)
CAN security architecture
Bluetooth WiFi Cellular V2X
IDS
![Page 33: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/33.jpg)
Experiment Car
• Cellular Connection • Cloud Service • Bluetooth Key
• Hybrid • Electronic Brake • Electric Power
Steering • Electronic Throttle
![Page 34: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/34.jpg)
Experiment car’s CAN network
![Page 35: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/35.jpg)
The CAN database
![Page 36: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/36.jpg)
Why don’t we build a model Take the relation ship of rpm and speed ,gear for example,we can create a model of the System‘s behavior
![Page 37: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/37.jpg)
汽车工作原理
![Page 38: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/38.jpg)
Anomaly detection system
Realtime data stream
Cross Prediction
Parameter extraction
![Page 39: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/39.jpg)
System model requirements
Gear
![Page 40: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/40.jpg)
Build the system model
Data Collection
Data preprocess
Data analysis
Feature Selection
Model Training &Testing
![Page 41: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/41.jpg)
Data Acquisition Parameter presence on different BUS
Parameter SpeedEngine
RPM
Acceleration
Pedal
Intake
Pressure
Brake
Pedal
Steering
WheelGear
BUS
Instrument o o x x o o o
Comfort o o x x o x x
Power o o o o o x x
ECM o o o o o x o
ESC o o o x o o o
![Page 42: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/42.jpg)
Data Acquisition Setup
![Page 43: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/43.jpg)
Data Analysis Can database is kept highly confidential
![Page 44: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/44.jpg)
Data Preprocess
![Page 45: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/45.jpg)
Data Preprocess
Interpolation
Sampling
Normalization
![Page 46: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/46.jpg)
Normalization
Must make sure the maximum and minimum value,don’t calculate from the training data
![Page 47: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/47.jpg)
数据插值
Observation
Interpolation
![Page 48: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/48.jpg)
Sub-Sampling
![Page 49: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/49.jpg)
Sub-Sampling Time_ms
RPM Speed MAP MAF AccPedal Throttle
138973
0.2879838
0.1342592
0.0590551
0.1675675
0.6971070
0.1377952
138974
0.2873125
0.1342592
0.0551181
0.1675675
0.6971070
0.1377952
138975
0.2873125
0.1342592
0.0511811
0.1675675
0.6971070
0.1377952
138976
0.285970 0.1342592
0.0472440
0.1675675
0.6971070
0.1377952
138977
0.285970 0.134259 0.0511811
0.1675675
0.6971070
0.1377952
![Page 50: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/50.jpg)
Sub-Sampling
![Page 51: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/51.jpg)
Model training
![Page 52: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/52.jpg)
Model training
![Page 53: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/53.jpg)
Results
![Page 54: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/54.jpg)
Result
![Page 55: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/55.jpg)
Model testing
![Page 56: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/56.jpg)
Model testing
![Page 57: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/57.jpg)
Acknowledgement
Professor Shuicheng Yan Doctor Ming Lin Doctor Zhanyi Wang Doctor Lin Huang
![Page 58: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/58.jpg)
Thank You!
Q&A
![Page 59: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/59.jpg)
Reference
![Page 60: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/60.jpg)
1. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010
2. Stephen Checkoway,Damon McCoy,Brian Kantor, Comprehensive Experimental Analyses of Automotive Attack Surfaces,2011.
3. Charlie Miller,Chris Valasek,Adventures in Automotive Networks and Control Units,2013.
4. Charlie Miller,Chris Valasek,Remote Exploitation of an Unaltered Passenger Vehicle,2015
5. Dieter Spaar,Sicherheitslücken bei BMWs ConnectedDrive/ Beemer, Open Thyself! – Security vulnerabilities in BMW's ConnectedDrive,2015.
6. Iamthecarvalry.org , Five Star Automotive Cyber Safety Framework,2015. 7. Pierre Kleberger,Security Aspects of the In-Vehicle Network in the Connected
Car,IEEE Intelligent Vehicles Symposium,2011 8. Marc Rogers,Kevin Mahaffey,How to Hack a Tesla Model S,DEF CON
23,2015 9. Charlie Miller Chris Valasek,Advanced CAN Injection Techniques for Vehicle
Networks,BlackhatUSA,2016 10. Kyong-Tak Cho and Kang G. Shin, Fingerprinting Electronic Control Units for
Vehicle Intrusion Detection, 2016
![Page 61: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/61.jpg)
11. Nobuyasu Kanekawa,X-by-Wire Systems,Hitachi Research Lab.2011 12. Paul Yih, Steer-by-Wire: Implication For Vehicle Handling and Safety,Stanford
PHD Dissertation,2005 13. Luigi Coppolion,Dependability aspects of automotive x-by-wire technologies,
2008. 14. Jonas Zaddach,Andrei Costin,Embedded Devices Security and Firmware Reverse
Engineering,Blackhat Workshop,2013. 15. Andrei costin,Jonas Zaddach,A large-Scale Analysis of the Security of
Embedded Firmwares,EURECOM,2014. 16. Samy Kamkar,Drive It Like You hacked It,DEF CON23,2015 17. David A Brown, Geoffrey Cooper, Automotive Security Best Practices, White
Paper by Intel & McAfee,2014. 18. OpenGarages, Car Hacker’s Handbook,openGarage.org,2014. 19. Henning Olsson, OptimumG,Vehicle Data Acquisition Using CAN,2010 20. Varun Chandola,Arindam Banerjee,Vipin Kumar,Anomaly Detection :A
Survey,2009
![Page 62: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/62.jpg)
21. Park, Ming Kuang, Neural learning of driving environment prediction for vehicle power management, Joint Conf. on Neural Networks, 2008.
22. Taylor, P., Adamu-Fika, F., Anand, S., Dunoyer, A., Griffiths, N., and Popham, T. Road type classification through data mining,2012.
23. Michael Muter, Naim Asaj,Entropy-based anomaly detection for in-vehicle networks", IEEE Intelligent Vehicles Symposium (IV), 2011.
24. Ulf E. Larson, Dennis K. Nilsson,An Approach to Specification-based Attack Detection for In-Vehicle Networks, IEEE Intelligent Vehicles Symposium,2008.
25. Y. L. Murphey, Zhi Hang Chen, L. Kiliaris, Jungme ,I. Tang and T. P. Breckon, Automatic road environment classication, IEEE Trans. on Intelligent Transportation Systems, 2011.
26. Salima Omar, Asri Ngadi, Hamid H.Jebur, Machine Learning Techniques for Anomaly Detection: An Overview.
27. Perter Harrington,Machine Learning In Action,2013. 28. Jurgen Schmidhuber, Deep learning in neural networks: An overview, 2015. 29. Kaiserslautern,Comparison of Unsupervised Anomaly Detection Techniques,
German Research Center for Artificial Intelligence, 2011
![Page 63: Automobile Intrusion Detection - CanSecWest. Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern Automobile, 2010 2. Stephen Checkoway,Damon McCoy,Brian …](https://reader031.vdocument.in/reader031/viewer/2022022012/5b1f7ec57f8b9a211a8b5518/html5/thumbnails/63.jpg)
30. Sepp Hochreiter, Jurgen Schmidhuber, Long short-term memory,Neural computation, 1997.
31. Michael Husken, Peter Stagge,Recurrent neural networks for time series classifcation, Neurocomputing, 2003.
32. Felix A Gers, Jurgen Schmidhuber, Fred Cummins, Learning to forget:Continual prediction with LSTM, Neural computation, 2000.
33. David E Rumelhart, Geo_rey E Hinton, and Ronald J Williams.,Learning internal representations by error propagation,1985.
34. Christopher M Bishop,Pattern recognition and machine learning, springer, 2006. 35. Simon Haykin and Neural Network. A comprehensive foundation. Neural
Networks, 2004. 36. Eleazar Eskin,Andrew Arnold,Michael Prerau, A Geometric Framework for
Unsupervised Anomaly Detection-Detecting Intrusions in Unlabeled Data tection-Detecting Intrusions in Unlabeled Data,2002.
37. Kingsly Leung, Christopher Leckie, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, 2005