Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/99844
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.creatorYu, Len_US
dc.creatorLiu, Yen_US
dc.creatorJing, Pen_US
dc.creatorLuo, Xen_US
dc.creatorXue, Len_US
dc.creatorZhao, Ken_US
dc.creatorZhou, Yen_US
dc.creatorWang, Ten_US
dc.creatorGu, Gen_US
dc.creatorNie, Sen_US
dc.creatorWu, Sen_US
dc.date.accessioned2023-07-24T01:02:57Z-
dc.date.available2023-07-24T01:02:57Z-
dc.identifier.isbn978-1-939133-31-1en_US
dc.identifier.urihttp://hdl.handle.net/10397/99844-
dc.description31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USAen_US
dc.language.isoenen_US
dc.rights© Author(s)en_US
dc.rightsThe following publication Yu, L., Liu, Y., Jing, P., Luo, X., Xue, L., Zhao, K., ... & Wu, S. (2022). Towards automatically reverse engineering vehicle diagnostic protocols. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 1939-1956) is available at https://www.usenix.org/conference/usenixsecurity22/presentation/yu-leen_US
dc.titleTowards automatically reverse engineering vehicle diagnostic protocolsen_US
dc.typeConference Paperen_US
dc.identifier.spage1939en_US
dc.identifier.epage1956en_US
dcterms.abstractIn-vehicle protocols are very important to the security assessment and protection of modern vehicles since they are used in communicating with, accessing, and even manipulating ECUs (Electronic Control Units) that control various vehicle components. Unfortunately, the majority of in-vehicle protocols are proprietary without publicly-available documentations. Although recent studies proposed methods to reverse engineer the CAN protocol used in the communication among ECUs, they cannot be applied to vehicle diagnostics protocols, which have been widely exploited by attackers to launch remote attacks. In this paper, we propose a novel framework for automatically reverse engineering the diagnostic protocols by leveraging professional diagnostic tools for vehicles. Specifically, we design and develop a new cyber-physical system that uses a set of algorithms to control a programmable robotics arm with the aid of cameras to automatically trigger and capture the messages of diagnostics protocols as well as reverse engineer their formats, semantic meanings, proprietary formulas used for processing the response messages. We perform a large scale experiment to evaluate our prototype by using 18 real vehicles. It successfully reverses engineers 570 messages (446 for reading sensor values and 124 for controlling components). The experimental results show that our framework achieves high precision in reverse engineering proprietary formulas and obtains much more messages than the prior approach based on app analysis.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIn Proceedings of the 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA, p. 1939-1956en_US
dcterms.issued2022-
dc.relation.conferenceUSENIX Security Symposium [USENIX Security]en_US
dc.description.validate202307 bcwwen_US
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumbera2291-
dc.identifier.SubFormID47370-
dc.description.fundingSourceSelf-fundeden_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCopyright retained by authoren_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
sec22-yu-le.pdf4.24 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

151
Citations as of Oct 6, 2025

Downloads

40
Citations as of Oct 6, 2025

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.