CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks

09/20/2022
by   Alvise de Faveri Tron, et al.
0

Current research in the automotive domain has proven the limitations of the CAN protocol from a security standpoint. Application-layer attacks, which involve the creation of malicious packets, are deemed feasible from remote but can be easily detected by modern IDS. On the other hand, more recent link-layer attacks are stealthier and possibly more disruptive but require physical access to the bus. In this paper, we present CANflict, a software-only approach that allows reliable manipulation of the CAN bus at the data link layer from an unmodified microcontroller, overcoming the limitations of state-of-the-art works. We demonstrate that it is possible to deploy stealthy CAN link-layer attacks from a remotely compromised ECU, targeting another ECU on the same CAN network. To do this, we exploit the presence of pin conflicts between microcontroller peripherals to craft polyglot frames, which allows an attacker to control the CAN traffic at the bit level and bypass the protocol's rules. We experimentally demonstrate the effectiveness of our approach on high-, mid-, and low-end microcontrollers, and we provide the ground for future research by releasing an extensible tool that can be used to implement our approach on different platforms and to build CAN countermeasures at the data link layer.

READ FULL TEXT
research
10/04/2019

HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

The High Definition Multimedia Interface (HDMI) is the de-facto standard...
research
06/02/2020

Jamming-Aware Control Plane in Elastic Optical Networks

Physical layer security is essential in optical networks. In this paper,...
research
12/03/2017

Analiza bezbednosnih mehanizama OSPF protokola

The security of the service and the system depends on the security of ea...
research
11/03/2020

You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

As Deep Packet Inspection (DPI) middleboxes become increasingly popular,...
research
01/28/2019

Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing

Key establishment is one fundamental issue in wireless security. The wid...
research
10/19/2022

A New Communication Protocol with Self Error Correction

Communication in poor network environment is always a difficult problem,...
research
02/12/2020

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

Bluetooth is a short-range wireless technology that provides audio and d...

Please sign up or login with your details

Forgot password? Click here to reset