Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol

11Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ever increasing number of electronic control units inside a car demanded more complex buses with higher bandwidth capacities. But even the more recently designed in-vehicle network protocols, e.g., FlexRay, were engineered in thse absence of security concerns and thus they are highly vulnerable to adversarial interventions. In this work, we study the FlexRay protocol specification to identify features that can be used to mount various attacks. The attacks exploit both the physical layer and the data-link layer of the protocol to discard messages from the bus, i.e., DoS attacks, or to spoof messages by inserting adversarial frames and later discarding the genuine frames. We illustrate the feasibility of these attacks on an experimental setup composed of several FlexRay nodes implemented on automotive-grade controllers. While these attacks may not be a surprise, recognizing them may be relevant in preventing potential future exploits.

Author supplied keywords

Cite

CITATION STYLE

APA

Murvay, P. S., & Groza, B. (2019). Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11391 LNCS, pp. 172–187). Springer Verlag. https://doi.org/10.1007/978-3-030-12143-3_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free