About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Cyber-Physical Systems and Smart Vehicles. First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings

Research Article

Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-51630-6_2,
        author={Josh Dafoe and Harsh Singh and Niusen Chen and Bo Chen},
        title={Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles},
        proceedings={Security and Privacy in Cyber-Physical Systems and Smart Vehicles. First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings},
        proceedings_a={SMARTSP},
        year={2024},
        month={2},
        keywords={Connected and autonomous vehicles ECU CAN bus flash translation layer TrustZone Steganography},
        doi={10.1007/978-3-031-51630-6_2}
    }
    
  • Josh Dafoe
    Harsh Singh
    Niusen Chen
    Bo Chen
    Year: 2024
    Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles
    SMARTSP
    Springer
    DOI: 10.1007/978-3-031-51630-6_2
Josh Dafoe1, Harsh Singh1, Niusen Chen1, Bo Chen1,*
  • 1: Department of Computer Science
*Contact email: bchen@mtu.edu

Abstract

With increasing development of connected and autonomous vehicles, the risk of cyber threats on them is also increasing. Compared to traditional computer systems, a CAV attack is more critical, as it does not only threaten confidential data or system access, but may endanger the lives of drivers and passengers. To control a vehicle, the attacker may inject malicious control messages into the vehicle’s controller area network. To make this attack persistent, the most reliable method is to inject malicious code into an electronic control unit’s firmware. This allows the attacker to inject CAN messages and exhibit significant control over the vehicle, posing a safety threat to anyone in proximity.

In this work, we have designed a defensive framework which allows restoring compromised ECU firmware in real time. Our framework combines existing intrusion detection methods with a firmware recovery mechanism using trusted hardware components equipped in ECUs. Especially, the firmware restoration utilizes the existing FTL in the flash storage device. This process is highly efficient by minimizing the necessary restored information. Further, the recovery is managed via a trusted application running in TrustZone secure world. Both the FTL and TrustZone are secure when the ECU firmware is compromised. Steganography is used to hide communications during recovery. We have implemented and evaluated our prototype implementation in a testbed simulating the real-world in-vehicle scenario.

Keywords
Connected and autonomous vehicles ECU CAN bus flash translation layer TrustZone Steganography
Published
2024-02-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-51630-6_2
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL