@baywiss1

Transport Layer Scanning for Attack Surface Detection in Vehicular Networks

, , , and . Transport Layer Scanning for Attack Surface Detection in Vehicular Networks, Article No.: 7, page 1-8. ACM Computer Science in Cars Symposium, (Dez 2020)
DOI: 10.1145/3385958.3430476

Abstract

In the beginning of every security analysis or penetration test of a system, information about the target has to be gathered. On IT-Systems a port scan is usually performed as a first step of an investigation. Since the communication protocols differ in automotive systems, generic port scanning tools can’t be used for a security analysis of CANs. More complex protocols have a higher likelihood of implementation errors and bugs. On CAN networks, such payloads are transferred through International Standard Transport Protocol (ISO-TP) communication. We designed a new methodology to identify ISO-TP endpoints in automotive networks. Every of these endpoints can provide exploitable application layer protocols and therefor has to be considered during penetration testing and security analysis. We contribute a new scan approach for the automated evaluation of possible attack surfaces in automotive CAN networks which has a higher coverage and multiple advantages than state of the art approaches.

Links and resources

Tags

community

  • @dblp
  • @baywiss1
@baywiss1's tags highlighted