Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/99845
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | en_US |
| dc.creator | Xue, L | en_US |
| dc.creator | Liu, Y | en_US |
| dc.creator | Li, T | en_US |
| dc.creator | Zhao, K | en_US |
| dc.creator | Li, J | en_US |
| dc.creator | Yu, L | en_US |
| dc.creator | Luo, X | en_US |
| dc.creator | Zhou, Y | en_US |
| dc.creator | Gu, G | en_US |
| dc.date.accessioned | 2023-07-24T01:02:58Z | - |
| dc.date.available | 2023-07-24T01:02:58Z | - |
| dc.identifier.isbn | 978-1-939133-31-1 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/99845 | - |
| dc.description | 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA | en_US |
| dc.language.iso | en | en_US |
| dc.rights | © Author(s) | en_US |
| dc.rights | The following publication Xue, L., Liu, Y., Li, T., Zhao, K., Li, J., Yu, L., ... & Gu, G. (2022). {SAID}: State-aware Defense Against Injection Attacks on In-vehicle Network. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 1921-1938) is available at https://www.usenix.org/conference/usenixsecurity22/presentation/xue-lei | en_US |
| dc.title | SAID : state-aware defense against injection attacks on in-vehicle network | en_US |
| dc.type | Conference Paper | en_US |
| dc.identifier.spage | 1921 | en_US |
| dc.identifier.epage | 1938 | en_US |
| dcterms.abstract | Modern vehicles are equipped with many ECUs (Electronic Control Unit) that are connected to the IVN (In-Vehicle Network) for controlling the vehicles. Meanwhile, various interfaces of vehicles, such as OBD-II port, T-Box, sensors, and telematics, implement the interaction between the IVN and external environment. Although rich value-added functionalities can be provided through these interfaces, such as diagnostics and OTA (Over The Air) updates, the adversary may also inject malicious data into IVN, thus causing severe safety issues. Even worse, existing defense approaches mainly focus on detecting the injection attacks launched from IVN, such as malicious/compromised ECUs, by analyzing CAN frames, and cannot defend against the higher layer MIAs (Message Injection Attacks) that can cause abnormal vehicle dynamics. In this paper, we propose a new state-aware abnormal message injection attack defense approach, named SAID. It detects the abnormal data to be injected into IVN by considering the data semantics and the vehicle dynamics and prevents the MIAs launched from devices connected to the vehicles, such as the compromised diagnostic tools and T-boxes. We develop a prototype of SAID for defending against MIAs and evaluate it using both real road data and simulation data. The experimental results show that SAID can defend against more than 99% of the network and service layer attack traffic and all state layer MIAs, effectively enforcing the safety of vehicles. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | In Proceedings of the 31st USENIX Security Symposium, August 10–12, 2022, Boston, MA, USA, p. 1921-1938 | en_US |
| dcterms.issued | 2022 | - |
| dc.relation.conference | USENIX Security Symposium [USENIX Security] | en_US |
| dc.description.validate | 202307 bcww | en_US |
| dc.description.oa | Version of Record | en_US |
| dc.identifier.FolderNumber | a2291 | - |
| dc.identifier.SubFormID | 47371 | - |
| dc.description.fundingSource | Self-funded | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Copyright retained by author | en_US |
| Appears in Collections: | Conference Paper | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| sec22-xue-lei.pdf | 10.17 MB | Adobe PDF | View/Open |
Page views
140
Citations as of Oct 6, 2025
Downloads
35
Citations as of Oct 6, 2025
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



