AutoSploit: From Automotive Safety-Critical Functionalities to Security Exploit

Nan Zhuang, Haonan Miao, Xiangxue Li*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The control features of vehicles have traditionally been focused solely on ensuring the safe operation of various integrated mechanical systems. Protocols standardized for vehicles typically concentrate on safety-related issues, and it has been widely assumed that the data provided by these protocols, such as the SAE J1979, is strictly related to safety and environmental reasons without impacting security aspects. However, this study reveals a contrasting scenario. Our interest lies particularly in the Engine Control Module (ECM), which has not received much attention until now, partly due to its intricate nature and the intersection of multiple disciplines. We use the EDC16 ECM model, commonly found in diesel engines, as a case study to demonstrate how automated scripts can identify and manipulate critical safety parameters within the extracted ECM firmware. These manipulations can lead to severe attacks, even at high speeds. Our research confirms the widespread applicability of our approach by testing it on various ECM models, including those used in hundreds of gasoline vehicle models from manufacturers like AUDI, BMW, and CHRYSLER. Our work suggests that the once clear-cut distinction between safety and security becomes increasingly blurred, necessitating a more holistic approach to vehicle design that addresses both safety mechanisms and potential security vulnerabilities.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 20th EAI International Conference, SecureComm 2024, Proceedings
EditorsSaed Alrabaee, Kim-Kwang Raymond Choo, Ernesto Damiani, Robert H. Deng
PublisherSpringer Science and Business Media Deutschland GmbH
Pages384-405
Number of pages22
ISBN (Print)9783031944543
DOIs
StatePublished - 2026
Event20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024 - Dubai, United Arab Emirates
Duration: 28 Oct 202430 Oct 2024

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume629 LNICST
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period28/10/2430/10/24

Keywords

  • CAN
  • ECM
  • ECU
  • Exploit
  • Safety-critical parameters

Fingerprint

Dive into the research topics of 'AutoSploit: From Automotive Safety-Critical Functionalities to Security Exploit'. Together they form a unique fingerprint.

Cite this