ERACAN: Defending Against an Emerging CAN Threat Model
Abstract
References
Index Terms
- ERACAN: Defending Against an Emerging CAN Threat Model
Recommendations
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityCurrent research in the automotive domain has proven the limitations of the Controller Area Network (CAN) protocol from a security standpoint. Application-layer attacks, which involve the creation of malicious packets, are deemed feasible from remote ...
CAN Bus Intrusion Detection Based on Auxiliary Classifier GAN and Out-of-distribution Detection
The Controller Area Network (CAN) is a ubiquitous bus protocol present in the Electrical/Electronic (E/E) systems of almost all vehicles. It is vulnerable to a range of attacks once the attacker gains access to the bus through the vehicle’s attack ...
BTMonitor: Bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network
With the rapid growth of connectivity and autonomy for today’s automobiles, their security vulnerabilities are becoming one of the most urgent concerns in the automotive industry. The lack of message authentication in Controller Area Network (CAN), ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Bo Luo,
- Xiaojing Liao,
- Jun Xu,
- Program Chairs:
- Engin Kirda,
- David Lie
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 509Total Downloads
- Downloads (Last 12 months)509
- Downloads (Last 6 weeks)186
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in