Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach

10/21/2019
by   Colin Urquhart, et al.
0

The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified.

READ FULL TEXT

page 1

page 2

page 3

page 6

page 7

page 10

page 11

page 13

research
07/17/2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles

Cyber security is one of the most significant challenges in connected ve...
research
05/07/2022

Anomaly Detection in Intra-Vehicle Networks

The progression of innovation and technology and ease of inter-connectiv...
research
12/12/2018

Security and Privacy Issues for Connected Vehicles

Modern vehicles contain more than a hundred Electronic Control Units (EC...
research
01/23/2018

Who Killed My Parked Car?

We find that the conventional belief of vehicle cyber attacks and their ...
research
11/22/2019

On the Robustness of Signal Characteristic-Based Sender Identification

Vehicles become more vulnerable to remote attackers in modern days due t...
research
08/07/2021

Arduino Controlled Spy Robo Car using Wireless Camera With live Streaming

Nowadays, the technological and digital world is developing very fast. E...

Please sign up or login with your details

Forgot password? Click here to reset