【论文阅读】【基于隐蔽带宽的汽车控制网络鲁棒认证】中的一些顶会论文摘要

读摘要,了解面貌

文章目录

  • [12]
  • [51]
  • [58]
  • [35]
  • [xx]

原文:https://webofscience.clarivate.cn/wos/alldb/full-record/WOS:000387820900034

Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating our environments (homes, factories, cars, and also our body-with wearable devices) to collect data and act on the insight derived. Ensuring software integrity (including OS, apps, and configurations) on such smart devices is then essential to guarantee both privacy and safety. A key mechanism to protect the software integrity of these devices is remote attestation: A process that allows a remote verifier to validate the integrity of the software of a device. This process usually makes use of a signed hash value of the actual device’s software, generated by dedicated hardware. While individual device attestation is a well-established technique, to date integrity verification of a very large number of devices remains an open problem, due to scalability issues.
In this paper, we present SANA, the first secure and scalable protocol for efficient attestation of large sets of devices that works under realistic assumptions. SANA relies on a novel signature scheme to allow anyone to publicly verify a collective attestation in constant time and space, for virtually an unlimited number of devices. We substantially improve existing swarm attestation schemes [5] by supporting a realistic trust model where: (1) only the targeted devices are required to implement attestation; (2) compromising any device does not harm others; and (3) all aggregators can be untrusted. We implemented SANA and demonstrated its efficiency on tiny sensor devices. Furthermore, we simulated SANA at large scale, to assess its scalability. Our results show that SANA can provide efficient attestation of networks of 1,000,000 devices, in only 2:5 seconds.

SANA:安全且可扩展的聚合网络认证
大量智能互联设备(也称为物联网 (IoT))正在渗透到我们的环境(家庭、工厂、汽车以及带有可穿戴设备的身体)中,以收集数据并根据获得的洞察采取行动。确保此类智能设备上的软件完整性(包括操作系统、应用程序和配置)对于保证隐私和安全至关重要。保护这些设备软件完整性的关键机制是远程证明:允许远程验证者验证设备软件完整性的过程。此过程通常使用由专用硬件生成的实际设备软件的签名哈希值。虽然单个设备认证是一种成熟的技术,但迄今为止,由于可扩展性问题,大量设备的完整性验证仍然是一个悬而未决的问题。

在本文中,我们提出了 SANA,这是第一个安全且可扩展的协议,用于对在现实假设下工作的大量设备进行有效证明。 SANA 依靠一种新颖的签名方案,允许任何人在恒定的时间和空间内公开验证几乎无限数量的设备的集体证明。我们通过支持现实的信任模型来大幅改进现有的集群证明方案[5],其中:(1)仅需要目标设备来实施证明; (2) 损害任何设备不会伤害他人; (3) 所有聚合器都可以是不可信的。我们实施了 SANA 并在微型传感器设备上展示了其效率。此外,我们还大规模模拟了 SANA,以评估其可扩展性。我们的结果表明,SANA 可以在 2 分 5 秒内提供 1,000,000 台设备网络的高效认证。


原文:https://www.usenix.org/conference/usenix-security-11/comprehensive-experimental-analyses-automotive-attack-surfaces
标题:汽车攻击面的综合实验分析

Abstrant: Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model—requiring prior physical access—has justifiably been viewed as unrealistic. Thus, it remains an open question if automobiles can also be susceptible to remote compromise. Our work seeks to put this question to rest by systematically analyzing the external attack surface of a modern automobile. We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft. Finally, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems and highlight the practical challenges in mitigating them.

摘要:现代汽车已普遍实现计算机化,因此很容易受到攻击。然而,虽然之前的研究表明一些现代汽车的内部网络不安全,但相关的威胁模型(需要事先进行物理访问)被合理地认为是不切实际的。因此,汽车是否也容易受到远程攻击仍然是一个悬而未决的问题。我们的工作旨在通过系统分析现代汽车的外部攻击面来解决这个问题。我们发现,通过广泛的攻击媒介(包括机械工具、CD 播放器、蓝牙和蜂窝无线电)进行远程利用是可行的,此外,无线通信通道允许远距离车辆控制、位置跟踪、车内音频泄露和盗窃。最后,我们讨论了导致此类问题的汽车生态系统的结构特征,并强调了缓解这些问题的实际挑战。


[12]

这个应该可以看一看
原文:https://link.springer.com/chapter/10.1007/978-3-319-66402-6_27
标题:分析CAN攻击者的能力

Abstract: The modern car is controlled by a large number of Electronic Control Units (ECUs), which communicate over a network of bus systems. One of the most widely used bus types is called Controller Area Network (CAN). Recent automotive hacking has shown that attacks with severe safety impact are possible when an attacker manages to gain access to a safety-critical CAN. In this paper, our goal is to obtain a more systematic understanding of the capabilities of the CAN attacker, which can support the development of security concepts for in-vehicle networks.

摘要:现代汽车由大量电子控制单元 (ECU) 控制,这些单元通过总线系统网络进行通信。最广泛使用的总线类型之一称为控制器局域网 (CAN)。最近的汽车黑客攻击表明,当攻击者设法获得对安全关键的 CAN 的访问权限时,就有可能造成严重安全影响的攻击。在本文中,我们的目标是更系统地了解 CAN 攻击者的能力,这可以支持车载网络安全概念的开发。


原文:https://dl.acm.org/doi/abs/10.1145/3399742
标题:幽灵攻击:利用推测执行

Abstract: Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try to guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithful in how it executes, can access the victim’s memory and registers, and can perform operations with measurable side effects.
Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary. This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim’s process. More broadly, the paper shows that speculative execution implementations violate the security assumptions underpinning numerous software security mechanisms, such as operating system process separation, containerization, just-in-time (JIT) compilation, and countermeasures to cache timing and side-channel attacks. These attacks represent a serious threat to actual systems because vulnerable speculative execution capabilities are found in microprocessors from Intel, AMD, and ARM that are used in billions of devices.
Although makeshift processor-specific countermeasures are possible in some cases, sound solutions will require fixes to processor designs as well as updates to instruction set architectures (ISAs) to give hardware architects and software developers a common understanding as to what computation state CPU implementations are (and are not) permitted to leak.

摘要:现代处理器使用分支预测和推测执行来最大限度地提高性能。例如,如果分支的目的地取决于正在读取的内存值,CPU 将尝试猜测目的地并尝试提前执行。当内存值最终到达时,CPU 要么放弃,要么提交推测计算。推测逻辑的执行方式是不忠实的,可以访问受害者的内存和寄存器,并且可以执行具有可测量副作用的操作。

幽灵攻击涉及诱导受害者推测性地执行在正确的程序执行期间不会发生的操作,并且通过侧通道将受害者的机密信息泄露给对手。本文描述了结合了侧通道攻击、故障攻击和可从受害者进程中读取任意内存的面向返回编程的方法的实际攻击。更广泛地说,该论文表明,推测执行实现违反了支撑众多软件安全机制的安全假设,例如操作系统进程分离、容器化、即时 (JIT) 编译以及缓存计时和侧通道攻击的对策。这些攻击对实际系统构成了严重威胁,因为在数十亿设备中使用的英特尔、AMD 和 ARM 微处理器中发现了易受攻击的推测执行功能。

尽管在某些情况下可以采取针对特定处理器的临时对策,但完善的解决方案需要修复处理器设计以及更新指令集架构 (ISA),以使硬件架构师和软件开发人员对 CPU 实现的计算状态有一个共同的理解(并且不允许)泄漏。


[51]

原文:https://dl.acm.org/doi/abs/10.1145/3134600.3134623
标题:VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks
标题:VulCAN:汽车控制网络的高效组件身份验证和软件隔离

Abstract: Vehicular communication networks have been subject to a growing number of attacks that put the safety of passengers at risk. This resulted in millions of vehicles being recalled and lawsuits against car manufacturers. While recent standardization efforts address security, no practical solutions are implemented in current cars.
This paper presents VulCAN, a generic design for efficient vehicle message authentication, plus software component attestation and isolation using lightweight trusted computing technology. Specifically, we advance the state-of-the-art by not only protecting against network attackers, but also against substantially stronger adversaries capable of arbitrary code execution on participating electronic control units. We demonstrate the feasibility and practicality of VulCAN by implementing and evaluating two previously proposed, industry standard-compliant message authentication protocols on top of Sancus, an open-source embedded protected module architecture. Our results are promising, showing that strong, hardware-enforced security guarantees can be met with a minimal trusted computing base without violating real-time deadlines under benign conditions.

摘要:车辆通信网络遭受越来越多的攻击,使乘客的安全面临风险。这导致数百万辆汽车被召回,并对汽车制造商提起诉讼。虽然最近的标准化工作解决了安全问题,但当前的汽车尚未实施任何实用的解决方案。

本文介绍了 VulCAN,一种用于高效车辆消息身份验证的通用设计,以及使用轻量级可信计算技术的软件组件证明和隔离。具体来说,我们不仅可以防御网络攻击者,还可以防御能够在参与的电子控制单元上执行任意代码的更强大的对手,从而推进最先进的技术。我们通过在 Sancus(一种开源嵌入式受保护模块架构)之上实施和评估两个先前提出的符合行业标准的消息身份验证协议,展示了 VulCAN 的可行性和实用性。我们的结果令人鼓舞,表明在良性条件下,可以通过最小的可信计算基础来满足强大的、硬件强制的安全保证,而不会违反实时期限。


[58]

原文: https://dl.acm.org/doi/abs/10.1145/3302509.3313783
标题:TACAN: transmitter authentication through covert channels in controller area networks
标题:TACAN:通过控制器局域网中的隐蔽通道进行发射机身份验证

Abstract: Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude of operations using the insecure Controller Area Network (CAN) bus in automotive Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and the safety of passengers is at risk. In this paper, we present TACAN (Transmitter Authentication in CAN), which provides secure authentication of ECUs by exploiting the covert channels without introducing CAN protocol modifications or traffic overheads (i.e., no extra bits or messages are used). TACAN turns upside-down the originally malicious concept of covert channels and exploits it to build an effective defensive technique that facilitates transmitter authentication via a trusted Monitor Node. TACAN consists of three different covert channels for ECU authentication: 1) Inter-Arrival Time (IAT)-based, leveraging the IATs of CAN messages; 2) offset-based, exploiting the clock offsets of CAN messages; 3) Least Significant Bit (LSB)-based, concealing authentication messages into the LSBs of normal CAN data. We implement the covert channels on the University of Washington (UW) EcoCAR testbed and evaluate their performance through extensive experiments. We demonstrate the feasibility of TACAN, highlighting no traffic overheads and attesting the regular functionality of ECUs. In particular, the bit error ratios are within 0.1% and 0.42% for the IAT-based and offset-based covert channels, respectively. Furthermore, the bit error ratio of the LSB-based covert channel is equal to that of a normal CAN bus, which is 3.1 x 10-7%.

摘要:如今,汽车系统与现代数字设备的互连为驾驶员提供了先进的用户体验。电子控制单元 (ECU) 使用汽车网络物理系统 (CPS) 中不安全的控制器局域网 (CAN) 总线执行多种操作。因此,可能会发生危险的攻击,例如禁用刹车,乘客的安全受到威胁。在本文中,我们提出了 TACAN(CAN 中的发送器身份验证),它通过利用隐蔽通道来提供 ECU 的安全身份验证,而无需引入 CAN 协议修改或流量开销(即,不使用额外的位或消息)。 TACAN 颠覆了隐蔽通道最初的恶意概念,并利用它构建了一种有效的防御技术,通过受信任的监控节点促进发射机身份验证。 TACAN 包含三种不同的用于 ECU 身份验证的隐蔽通道: 1) 基于到达间隔时间 (IAT),利用 CAN 消息的 IAT; 2) 基于偏移,利用 CAN 消息的时钟偏移; 3) 基于最低有效位 (LSB),将身份验证消息隐藏到正常 CAN 数据的 LSB 中。我们在华盛顿大学 (UW) EcoCAR 测试平台上实施隐蔽通道,并通过大量实验评估其性能。我们展示了 TACAN 的可行性,强调没有流量开销并证明了 ECU 的常规功能。特别是,基于 IAT 和基于偏移的隐蔽通道的误码率分别在 0.1% 和 0.42% 以内。此外,基于LSB的隐蔽通道的误码率与普通CAN总线的误码率相同,为3.1 x 10-7%。


[35]

原文:https://link.springer.com/chapter/10.1007/978-3-319-60876-1_9
标题:Analyzing the Capabilities of the CAN Attacker
标题:一种针对汽车网络的隐身、选择性、链路层拒绝服务攻击

Abstract: Modern vehicles incorporate tens of electronic control units (ECUs), driven by as much as 100,000,000 lines of code. They are tightly interconnected via internal networks, mostly based on the CAN bus standard. Past research showed that, by obtaining physical access to the network or by remotely compromising a vulnerable ECU, an attacker could control even safety-critical inputs such as throttle, steering or brakes. In order to secure current CAN networks from cyberattacks, detection and prevention approaches based on the analysis of transmitted frames have been proposed, and are generally considered the most time- and cost-effective solution, to the point that companies have started promoting aftermarket products for existing vehicles.
In this paper, we present a selective denial-of-service attack against the CAN standard which does not involve the transmission of any complete frames for its execution, and thus would be undetectable via frame-level analysis. As the attack is based on CAN protocol weaknesses, all CAN bus implementations by all manufacturers are vulnerable. In order to precisely investigate the time, money and expertise needed, we implement an experimental proof-of-concept against a modern, unmodified vehicle and prove that the barrier to entry is extremely low. Finally, we present a discussion of our threat analysis, and propose possible countermeasures for detecting and preventing such an attack.

摘要:现代车辆配备了数十个电子控制单元 (ECU),由多达 1 亿行代码驱动。它们通过内部网络紧密互连,主要基于 CAN 总线标准。过去的研究表明,通过获得对网络的物理访问或远程破坏易受攻击的 ECU,攻击者甚至可以控制油门、转向或刹车等安全关键输入。为了保护当前 CAN 网络免受网络攻击,人们提出了基于传输帧分析的检测和预防方法,并且通常被认为是最具时间和成本效益的解决方案,以至于公司已经开始推广售后市场产品现有车辆。

在本文中,我们提出了针对 CAN 标准的选择性拒绝服务攻击,该攻击不涉及传输任何完整帧来执行,因此通过帧级分析无法检测到。由于攻击是基于 CAN 协议的弱点,所有制造商的所有 CAN 总线实施都容易受到攻击。为了精确调查所需的时间、金钱和专业知识,我们对未经改装的现代车辆进行了实验性概念验证,并证明进入门槛极低。最后,我们讨论了我们的威胁分析,并提出了检测和防止此类攻击的可能对策。


[xx]

原文:
标题:
标题:
Abstract:

摘要:

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/178614.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

深度学习之基于百度飞桨PaddleOCR图像字符检测识别系统

欢迎大家点赞、收藏、关注、评论啦 ,由于篇幅有限,只展示了部分核心代码。 文章目录 一项目简介主要特点使用步骤 二、功能三、系统四. 总结 一项目简介 # Introduction to PaddleOCR Image Character Detection and Recognition System Based on Baidu…

享元模式-C++实现

享元模式(FlyWeight Pattern)是一种结构型设计模式,旨在减少对象创建的数量,节省内存和提高性能。 在某些情况下,一个项目里可能需要创建大量相似的对象,这样对象的一部分是共享的(相同的&…

Java基础-中级-高级面试题汇(一)

第一部分: Java基础面试题汇总 1.面向对象和面向过程的区别? 面向对象和面向过程是两种不同的编程思想。面向对象是一种以对象为中心的编程思想,将数据和处理数据的方法封装在一起,形成一个类。程序通过创建对象来调用类中的方法…

静态住宅IP代理实际应用:它的强大用途你知道吗?

静态住宅IP代理与动态IP代理相比,提供了更稳定的网络身份,使得企业在进行数据采集、区域定位营销和市场研究时更为高效。同时,它也是提高在线隐私保护和避免封禁的有效工具。 通过详细分析,你将能全面了解静态住宅IP代理的应用&a…

SAP_ABAP_编程基础_字符转换_内存表、jsonString 相互转换

SAP ABAP 顾问(开发工程师)能力模型_Terry谈企业数字化的博客-CSDN博客文章浏览阅读441次。目标:基于对SAP abap 顾问能力模型的梳理,给一年左右经验的abaper 快速成长为三年经验提供超级燃料!https://blog.csdn.net/j…

【力扣:1707 1803】0-1字典树

思路:树上每个节点存储拥有该节点的数组元素的最小值,left节点表示0,right节点表示1,构建完成后遍历树当子节点没有比mi小的元素时直接输出-1,否则向下构造。 struct tree{int m;tree*leftnullptr,*rightnullptr;tree…

【传智杯】儒略历、评委打分、萝卜数据库题解

🍎 博客主页:🌙披星戴月的贾维斯 🍎 欢迎关注:👍点赞🍃收藏🔥留言 🍇系列专栏:🌙 蓝桥杯 🌙请不要相信胜利就像山坡上的蒲公英一样唾手…

人工智能在现代科技中的应用和未来发展趋势-AI生成

人工智能(AI)是一种计算机科学技术,它为计算机系统赋予了类似人类思维和学习能力的功能。人工智能在现代科技中的应用越来越广泛,从智能手机到智能家居、自动驾驶汽车、医疗诊断、金融交易、机器人等众多领域都可以看到人工智能的…

精调llama模型

github地址:https://github.com/facebookresearch/llama-recipes github:https://github.com/facebookresearch/llama import torch from transformers import LlamaForCausalLM, LlamaTokenizer#model_id"./models_hf/7B" # 可以从huggingface上面下载模…

pandas教程:2012 Federal Election Commission Database 2012联邦选举委员会数据库

文章目录 14.5 2012 Federal Election Commission Database(2012联邦选举委员会数据库)1 Donation Statistics by Occupation and Employer(按职业与雇主划分的捐赠数据)2 Bucketing Donation Amounts(桶捐赠额&#x…

vue项目实战-电商后台管理系统

项目简介: 该项目为电商后台的管理系统。设计了登录页面。 管理人员需要通过输入正确的用户名和密码才能登录。登陆成功之后进入管理页面: 管理页面由五个子模块组成:用户管理,权限管理,商品管理,订单管理…

实验八-数据处理

目录 1.数据来源 2.对于All表: 3.对于sf 和sfweibo 表: 4. 对于base_info表: 5.导出最后结果到一个Excel文件中,完成数据处理。 1.数据来源 本次所分析的数据是通过爬虫抓取的微博数据。选取新浪微博为数据平台,选…

electron打包 Error output: !include: could not find:

Error output: 2 !include: could not find: "C:\Users\xxxx(这里是中文)\AppData\Local\Temp\t-TH3KzB\0-messages.nsh" 3 Error in script "<stdin>" on line 75 -- aborting creation process这个报错意思是路径有中文存在&#xff0c;解析不到&a…

STM32CubeIDE(ADC)

学习链接&#xff1a;【HAL库详解】STM32 ADC HAL库使用_哔哩哔哩_bilibili 目录 一、概念 1、ADC介绍 2、ADC主要特征 二、ADC模式 1、查询模式 1.1 单通道采集软件配置 1.2 查询模式步奏 1.3 单通道采集主要代码 2、多通道采集 2.1 软件配置 2.2 主要代码 一、概…

【Linux】Linux第一个小程序 --- 进度条

&#x1f466;个人主页&#xff1a;Weraphael ✍&#x1f3fb;作者简介&#xff1a;目前正在学习c和Linux还有算法 ✈️专栏&#xff1a;Linux &#x1f40b; 希望大家多多支持&#xff0c;咱一起进步&#xff01;&#x1f601; 如果文章有啥瑕疵&#xff0c;希望大佬指点一二 …

RBAC(Role-Based Access Control,基于角色的访问控制)

1. RBAC核心概念 RBAC&#xff08;Role-Based Access Control&#xff0c;基于角色的访问控制&#xff09;是一种广泛应用于软件和系统中的权限管理模型。它通过将用户与角色关联&#xff0c;再将角色与访问权限关联&#xff0c;来管理用户对系统资源的访问。RBAC模型的主要特…

电子学会C/C++编程等级考试2022年06月(三级)真题解析

C/C++等级考试(1~8级)全部真题・点这里 第1题:制作蛋糕 小A擅长制作香蕉蛋糕和巧克力蛋糕。制作一个香蕉蛋糕需要2个单位的香蕉,250个单位的面粉,75个单位的糖,100个单位的黄油。制作一个巧克力蛋糕需要75个单位的可可粉,200个单位的面粉,150个单位的糖,150个单位的黄…

jenkins 代码执行 (CVE-2017-1000353)漏洞复现

jenkins 代码执行 (CVE-2017-1000353)漏洞复现 名称: jenkins 代码执行 &#xff08;CVE-2017-1000353&#xff09; 描述: ​Jenkins 可以通过其网页界面轻松设置和配置,其中包括即时错误检查和内置帮助。 插件 通过更新中心中的 1000 多个插件,Jenkins 集成了持续集成和持续…

【C++初阶(九)】 priority_queue的使用与模拟实现

本专栏内容为&#xff1a;C学习专栏&#xff0c;分为初阶和进阶两部分。 通过本专栏的深入学习&#xff0c;你可以了解并掌握C。 &#x1f493;博主csdn个人主页&#xff1a;小小unicorn ⏩专栏分类&#xff1a;C &#x1f69a;代码仓库&#xff1a;小小unicorn的代码仓库&…

删除链表的倒数第N个节点,剑指offerII(21),力扣

目录 题目地址&#xff1a; 题目&#xff1a; 相似类型题&#xff1a; 我们直接看本题题解吧&#xff1a; 解题方法&#xff1a; 难度分析&#xff1a; 解题分析&#xff1a; 解题思路&#xff08;双指针&#xff09;&#xff1a; 代码实现&#xff1a; 代码说明&#xff1a; 代…