Deakin University
Browse

File(s) under permanent embargo

Investigating security vulnerabilities in modern vehicle systems

Version 2 2024-06-04, 02:38
Version 1 2016-11-15, 15:34
conference contribution
posted on 2024-06-04, 02:38 authored by X Zheng, Lei PanLei Pan, H Chen, P Wang
Modern vehicle systems have evolved from an isolated control system into an interconnected architecture combining software, hardware, and data. Such architecture is specialized into vehicle infotainment system (e.g., SYNC of Ford, iDrive of BMW and MMI of Audi), Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and vehicle social system which connects to social media networks. These systems hold private and sensitive information such as travel plans, social network messages, login credentials to bank accounts, and so on, which is a lucrative target for malicious attackers. Unfortunately, existing research overlooks the security issues with respect to this highly integrated system. This paper presents security issues across various systems related to modern vehicles through a a holistic and systematic view. We analyze each system components with respect to published attacks in details and present a synthesized body of knowledge. We identify the growing trend where security attacks are launched from the cyber space to vehicle control system via smartphones and vehicle networks. In the foreseeable future, we expect more security attacks both in numbers and in complexity. Knowing this will arise the awareness of vehicle system security and help engineers to build security solutions.

History

Volume

651

Pagination

29-40

Location

Cairns, Queensland

Start date

2016-10-26

End date

2016-10-28

ISSN

1865-0929

eISSN

1865-0937

ISBN-13

9789811027406

Language

eng

Publication classification

E Conference publication, E1 Full written paper - refereed

Copyright notice

2016, Springer

Editor/Contributor(s)

Batten L, Li G

Title of proceedings

ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security

Event

Applications and Techniques in Information Security. International Conference (6th : 2016 : Cairns, Queensland)

Publisher

Springer

Place of publication

Berlin, Germany

Series

Communications in Computer and Information Science