Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

Sagong Uk Sang, Xuhang Ying, Andrew Clark, L. Bushnell, R. Poovendran
{"title":"Cloaking the Clock: Emulating Clock Skew in Controller Area Networks","authors":"Sagong Uk Sang, Xuhang Ying, Andrew Clark, L. Bushnell, R. Poovendran","doi":"10.1109/ICCPS.2018.00012","DOIUrl":null,"url":null,"abstract":"Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able to infiltrate the in-vehicle network. Motivated by these attacks, intrusion detection systems (IDSs) have been proposed for in-vehicle networks that attempt to detect attacks by exploiting physical properties such as clock skew of an ECU. In this paper, we propose the cloaking attack, an intelligent masquerade attack in which an adversary modifies the timing of transmitted messages to match the clock skew of a targeted ECU. The attack leverages the fact that, while the clock skew is a physical property of each ECU that cannot be changed by the adversary, the estimation of the clock skew by other ECUs is based on the timing of network traffic, which, being a cyber component only, can be modified by an adversary. We implement the proposed cloaking attack and test it on two IDSs, namely, the current state-of-the-art IDS and its adaptation to the widely-used Network Time Protocol (NTP). We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle, and show that it is able to deceive both IDSs. We also introduce a new metric called the Maximum Slackness Index to quantify the effectiveness of a clock skew-based IDS in detecting masquerade attacks when the adversary is unable to precisely match the clock skew of the targeted ECU.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"69","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPS.2018.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 69

Abstract

Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able to infiltrate the in-vehicle network. Motivated by these attacks, intrusion detection systems (IDSs) have been proposed for in-vehicle networks that attempt to detect attacks by exploiting physical properties such as clock skew of an ECU. In this paper, we propose the cloaking attack, an intelligent masquerade attack in which an adversary modifies the timing of transmitted messages to match the clock skew of a targeted ECU. The attack leverages the fact that, while the clock skew is a physical property of each ECU that cannot be changed by the adversary, the estimation of the clock skew by other ECUs is based on the timing of network traffic, which, being a cyber component only, can be modified by an adversary. We implement the proposed cloaking attack and test it on two IDSs, namely, the current state-of-the-art IDS and its adaptation to the widely-used Network Time Protocol (NTP). We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle, and show that it is able to deceive both IDSs. We also introduce a new metric called the Maximum Slackness Index to quantify the effectiveness of a clock skew-based IDS in detecting masquerade attacks when the adversary is unable to precisely match the clock skew of the targeted ECU.
掩盖时钟:控制器局域网中时钟偏差的仿真
汽车配备了通过控制器局域网(CAN)等车载网络协议标准进行通信的电子控制单元(ecu)。这些协议的设计是基于这样的假设:将车内通信与外部网络分离,足以抵御网络攻击。然而,这种假设在最近的攻击中已经被证明是无效的,攻击者能够渗透到车载网络中。在这些攻击的推动下,入侵检测系统(ids)被提议用于车载网络,试图通过利用ECU的时钟倾斜等物理属性来检测攻击。在本文中,我们提出了隐形攻击,这是一种智能伪装攻击,攻击者修改传输消息的时间以匹配目标ECU的时钟倾斜。攻击利用了这样一个事实,即时钟偏差是每个ECU的物理属性,攻击者无法改变它,而其他ECU对时钟偏差的估计是基于网络流量的时间,而网络流量只是一个网络组件,可以被攻击者修改。我们实现了所提出的隐形攻击,并在两个IDS上进行了测试,即当前最先进的IDS及其对广泛使用的网络时间协议(NTP)的适应。我们在原型机和真实车辆两个硬件测试平台上实现了隐身攻击,并表明它能够欺骗两个入侵防御系统。我们还引入了一个称为最大松弛指数的新指标,用于量化基于时钟偏差的IDS在检测伪装攻击时的有效性,当对手无法精确匹配目标ECU的时钟偏差时。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信