skip to main content
10.1145/2735960.2735992acmconferencesArticle/Chapter ViewAbstractPublication PagesiccpsConference Proceedingsconference-collections
poster

Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks

Published: 14 April 2015 Publication History

Abstract

As the passenger vehicles evolve to be "smart", electronic components, including communication and intelligent software, are continuously introduced to new models and concept vehicles. The new paradigm introduces new features and benefits, but also brings new security concerns.
Smart cars are considered cyber-physical systems (CPS) because of their integration of cyber- and physical-components. In recent years, various threats, vulnerabilities, and attacks have been discovered from different models of smart cars. In the worst-case scenario, external attackers may remotely obtain full control of the vehicle by exploiting an existing vulnerability. In this poster, we examine smart car security from a CPS' perspective, and derive a taxonomy of threats, vulnerabilities, and attacks. We demonstrate a systematic model of smart car security by distinguishing between cyber, cyber-physical, and physical (C-CP-P) components and their interactions. We present our reflections on how the systematic model and taxonomy could be utilized to help the development of effective control mechanisms.

References

[1]
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, 2011.
[2]
A. Francillon, B. Danev, S. Capkun, S. Capkun, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS, 2011.
[3]
T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive can networks --- practical examples and selected short-term countermeasures. In SAFECOMP, 2008.
[4]
R. M. Ishtiaq Roufa, H. Mustafaa, S. O. Travis Taylora, W. Xua, M. Gruteserb, W. Trappeb, and I. Seskarb. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In 19th USENIX Security Symposium, Washington DC, pages 11--13, 2010.
[5]
C. P. Peeger and S. L. Peeger. Security in Computing (4th Edition). Prentice Hall PTR, 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCPS '15: Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems
April 2015
269 pages
ISBN:9781450334556
DOI:10.1145/2735960
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2015

Check for updates

Qualifiers

  • Poster

Conference

ICCPS '15
Sponsor:

Acceptance Rates

ICCPS '15 Paper Acceptance Rate 25 of 91 submissions, 27%;
Overall Acceptance Rate 25 of 91 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)3
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media