1 / 11

Smart Cars and Cybersecurity

Smart Cars and Cybersecurity. Chavez Jaichand IASP 470. The list of connected features enjoyed by consumers that add more opportunities for security attacks include streaming radio, Wi-Fi access points and remote-control mobile phone applications. Stealing personally identifiable information.

laurenj
Download Presentation

Smart Cars and Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Smart Cars and Cybersecurity Chavez Jaichand IASP 470

  2. The list of connected features enjoyed by consumers that add more opportunities for security attacks include streaming radio, Wi-Fi access points and remote-control mobile phone applications.

  3. Stealing personally identifiable information Financial information, personal trip information, location information and entertainment preferences are just some examples of PII that can potentially be stolen through a vehicle’s system.

  4. Manipulating a vehicle’s operation Proof-of-concept attacks where hackers are able to control the braking and steering of a car by accessing the adaptive cruise control system

  5. Threats: Unauthorized Vehicle Entry Many vehicle technologies have opted to replace physical ignition systems with keyless systems using mobile applications or wireless key fobs.

  6. Threats: OBD Port Security OBD ports are considered as entry points to attack the ECUs that are connected to the CAN buses. Automotive viruses can be injected into the ECUs through the OBD port and trigger specific messages on the bus when specific conditions are met.

  7. Threats: Mobile Car Application Security Threats against auto mobile applications include downloading the mobile application with an injected malicious code or planted Trojan horse in the Apple Appstore or the Google Play Store.

  8. SOLUTIONS: Software Updates and Patches Software Updates and Patches are important to correct know vulnerabilities so hackers can not exploit them anymore.

  9. SOLUTIONS: Over the Air Updates OTA updates may include software fixes, firmware upgrades, and security patches. To address computer vulnerabilities and avoid costly recalls, more vehicles’ manufacturers start using the OTA updates.

  10. SOLUTIONS: Threat Intelligence • A sophisticated threat intelligence is needed to safeguard connected vehicles and to identify and mitigate cyberattacks. • Threat intelligence is one of the best ways to keep you ahead of threats. • It provides real-time data queries for solution deployment with regard to cybercriminal activities.

  11. References • https://www.intertrust.com/intertrustblog/top-5-security-risks-for-connected-cars/ • Becsi, T., Aradi, S., & Gaspar, P. (2015). Security issues and vulnerabilities in connected car systems. 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS). doi:10.1109/mtits.2015.7223297 • Constantin, L. (2016, September 20). Researchers hack Tesla Model S with remote attack. Retrieved from https://www.pcworld.com/article/3121999/researchers-demonstrate-remote-attack-against-tesla-model-s.html • Eiza, M. H., & Ni, Q. (2017). Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity. IEEE Vehicular Technology Magazine,12(2), 45-51. doi:10.1109/mvt.2017.2669348 • Okul, Ş, Aydin, M. A., & Keleş, F. (2018). Security Problems and Attacks on Smart Cars. Lecture Notes in Electrical Engineering International Telecommunications Conference,203-213. doi:10.1007/978-981-13-0408-8_17 • Trend Micro. (2017). Cybersecurity Solutions for Connected Vehicles [Brochure]. New york city, NY: Author.

More Related