• Title/Summary/Keyword: 자동차 해킹

Search Result 28, Processing Time 0.056 seconds

A Study on the Prediction and Countermeasure of Hacking Threat of Car using Bluetooth (블루투스를 통한 자동차 해킹 위협에 대한 예상과 대응방안에 대한 연구)

  • Kwon, Ku-Hwan;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.477-479
    • /
    • 2015
  • 해킹의 범위가 넓어지고 있는 현 시대에는 컴퓨터 통신 장비만을 해킹 하던 과거와 달리 우리가 살고 있는 21세기에는 컴퓨터 시스템에 한정되지 않고 인간이 사용하는 모든 장비에 통신시스템이 설계되면서 해킹이 가능한 장비들의 범주가 증가하고 있고 인간이 사용하는 모든 통신장비를 해킹하는 사례가 증가하는 추세이다. 특히 스마트 자동차가 나오기 시작하면서 스마트 자동차에 대한 해킹의 위험이 높아지고 있는 상황이다. 블루투스에 대한 보안적인 요소들과 보안 취약점 및 대응방안에 대하여 제안하였다.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

Civil liability and criminal liability of accidents caused by autonomous vehicle hacking (해킹으로 인한 자율주행자동차 사고 관련 책임 법제에 관한 연구 -민사상, 형사상, 행정책임 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.19-30
    • /
    • 2019
  • As the 4th industrial revolution has recently become a hot topic, the importance of autonomous vehicles has increased and interest has been increasing worldwide, and accidents involving autonomous vehicles have also occurred. With the development of autonomous vehicles, the possibility of a cyber-hacking threat to the car network is increasing. Various countries, including the US, UK and Germany, have developed guidelines to counter cyber-hacking of autonomous vehicles, In the case of Korea, limited temporary operation of autonomous vehicles is being carried out, but the legal system to be applied in case of accidents caused by vehicle network hacking is insufficient. In this paper, based on the existing legal system, we examine the civil liability caused by the cyber hacking of the autonomous driving car, while we propose a law amendment suited to the characteristics of autonomous driving car and a legal system improvement plan that can give sustainable trust to autonomous driving car.

A Smart Car Software Security System based on Code Splitting (코드 분리 기반 스마트 자동차 소프트웨어 보안 시스템)

  • Kim, Kyung-ri;Seo, Hyemin;Tae, Heejee;Lee, Soowon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.225-226
    • /
    • 2018
  • 최근 스마트 카가 발전하면서 물리적 키에서 스마트 키로 차량용 키도 변화하고 있다. 이에 따라 스마트 키에 대한 해킹 위협도 증가하고 있으며 스마트 키의 보안은 점점 중요해지고 있다. 기존의 스마트키는 자동차 시스템이 부팅 된 후에 데이터 값을 비교하는 방식으로 사용자 인증을 진행한다. 이러한 방식은 시스템이 이미 부팅된 상태이므로 여전히 해킹의 위협이 존재한다는 점에서 안전하지 않다. 본 연구에서는 이를 개선하기 위해 Python 코드 분리 기술과 APK 바이트 코드 분리 기술을 자동차 부팅 코드와 엔진 APK의 바이트 코드에 적용하는 방법을 제안한다. 제안 기술이 적용되지 않은 APK와 적용된 APK를 리패징하여 해킹에 대한 본 연구의 안정성을 검증하였다.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Device Hacking Scenario and Countermeasures with COAP in the Internet of Things Environment (사물인터넷 환경에서 CoAP을 이용한 디바이스 해킹시나리오 및 대응방안)

  • Choi, Seunghyeon;Seo, Chorong;Lee, Keun-Ho;Jeon, You-Boo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.289-291
    • /
    • 2016
  • 최근 정보통신기술의 눈부신 발전으로 사람-사람, 사람-사물, 사물-사물 각각을 연결하여 최대한의 시너지를 발휘하려는 움직임이 활발해지고 있다. 즉 일상생활에서 사용되는 자동차, 가전제품, 드론 등의 제품도 연결되어 통신하는 사물인터넷 시대가 도래 하고 있다. 머지않아 모든 기기가 연결되는 시대가 오면 물리적 보안 보다 논리적 보안이 중요해 질 것이다. 또한 사물인터넷 해킹은 정보보호라는 단위를 넘어 사람의 생명과 직결되는 해킹 피해가 발생할 위험이 있다.

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

Counterattack Method against Hacked Node in CAN Bus Physical Layer (CAN 버스 물리 계층에서 해킹된 노드의 대처 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1469-1472
    • /
    • 2019
  • CAN bus in automotive applications does not assign node addresses. When a node is hacked and it transmits malicious data frame, it is difficult to resolve which node is hacked. However, this CAN bus internal attack seriously threatens the safety of a car, so a prompt counterattack is necessary in the CAN bus physical layer. This paper proposes a counterattack method against malicious CAN bus internal attack. When a malicious data frame is detected, an intrusion detection system in the CAN bus increases the error counter of the malicious node. Then, the malicious node is off from the bus when its error counter exceeds its limit. A CAN controller with the proposed method is implemented in Verilog HDL, and the proposed method is proved to counterattack against malicious CAN bus internal attack.

Vulnerability analysis of smart key for vehicle and countermeasure against hacking attack (차량용 스마트키 취약점 분석과 해킹공격 대응방안)

  • Kim, Seung-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.302-305
    • /
    • 2017
  • With the development of new ICT technology, new technologies are being applied to automobiles. The smart key for vehicles is also a device to which ICT new technology is applied. Therefore, a cyber-hacking attack against a smart key of a vehicle is possible. The cyber attack on the smart key can cause an abnormal control of the vehicle. Vehicle control can lead to vehicle hijacking and vehicle control risks. In this paper, we analyze the vulnerability of smart key for vehicle. Analyze cyber attacks against smart keys in vehicles. Then, we conduct real hacking attacks on smart keys for vehicles and propose countermeasures. We conduct a hacking attack against the smart key for vehicle that has devised countermeasures and analyze countermeasures against cyber attack security. This paper will contribute to the prevention of vehicle deodorization and to the safety of the people.

  • PDF