Presentation 2018-10-29
Security Evaluations of Automotive Attacks on FlexRay
Junko Takahashi, Masashi Tanaka,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper investigates a difficulty and a threat of previous attacks on FlexRay and reports that abnormal vehicle behaviors can be induced by the most feasible attacks using a real vehicle. Recently, many studiespresented some kinds of attacks which are the threats for the real vehicles in Controller Area Network (CAN) bus and the researches on protection against such attacks become urgent issue. Although FlexRay is used for the vehicle controls of the running and driving support systems, there is few previous studies. In SCIS 2018, the DoS and spoofing attacks methods on the FlexRay protocol were proposed in details. However, this study is only theoretically proposed and a feasibility of the attacks using the real vehicles was not shown. This study investigates the difficulty and the threat of the attacks proposed in SCIS 2018 and evaluates whether the attacks, which is theoretically considered to be most feasible, is realistic or not using the real vehicles. In fact, we can induce the abnormal behaviors regarding the body control by injecting the fabricated messages effectively into the open slot inthe FlexRay communications. Furthermore, we show example countermeasures for the attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Automotive Security / In-Vehicle Network / FlexRay / Connected Car
Paper # HWS2018-55,ICD2018-47
Date of Issue 2018-10-22 (HWS, ICD)

Conference Information
Committee HWS / ICD
Conference Date 2018/10/29(1days)
Place (in Japanese) (See Japanese page)
Place (in English) Kobe Univ. Umeda Intelligent Laboratory
Topics (in Japanese) (See Japanese page)
Topics (in English) HardwareSecurity, etc.
Chair Tsutomu Matsumoto(Yokohama National Univ.) / Hideto Hidaka(Renesas)
Vice Chair Shinichi Kawamura(Toshiba) / Makoto Ikeda(Univ. of Tokyo) / Makoto Nagata(Kobe Univ.)
Secretary Shinichi Kawamura(Kobe Univ.) / Makoto Ikeda(SECOM) / Makoto Nagata(Panasonic)
Assistant / Hiroyuki Ito(Tokyo Inst. of Tech.) / Masatoshi Tsuge(Socionext) / Tetsuya Hirose(Kobe Univ.)

Paper Information
Registration To Technical Committee on Hardware Security / Technical Committee on Integrated Circuits and Devices
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security Evaluations of Automotive Attacks on FlexRay
Sub Title (in English)
Keyword(1) Automotive Security
Keyword(2) In-Vehicle Network
Keyword(3) FlexRay
Keyword(4) Connected Car
1st Author's Name Junko Takahashi
1st Author's Affiliation NTT Secure Platform Laboratories(NTT)
2nd Author's Name Masashi Tanaka
2nd Author's Affiliation NTT Secure Platform Laboratories(NTT)
Date 2018-10-29
Paper # HWS2018-55,ICD2018-47
Volume (vol) vol.118
Number (no) HWS-272,ICD-273
Page pp.pp.47-52(HWS), pp.47-52(ICD),
#Pages 6
Date of Issue 2018-10-22 (HWS, ICD)