Jun Li
Twitter:@bravo_fighter
UnicornTeam
Qihoo360
Automobile Intrusion Detection
2
What this talk is
about?
Automotive intrusion detection
Automotive cyber-security architecture
3
From the highest viewpointJ
Outline
•  Quick recap of the status quo of
car security research
•  Little automobile working principle
•  CAN bus anomaly detection
Performance
Tuning by
modifying
firmware
Immobilizer
Cracking
(Hitag,
Keeloq)
DARPA&UW
OBD
interface
attack,etc.
Karl et al.
Remote
attack
via wireless
OBD
interface
Telsa
Qihoo360
BMW
ConnectedDrive
vuln
Mbrace Jeep Uconnect
Charlie&Chris
GM Onstar
Vuln,Sammy
More to
come ?
Sure!
Car hacking
development
Car explained
Sensor security
In automotive electronics, Electronic
Control Unit (ECU) is a generic term for
any secret system that controls one or
more of the electrical system or
subsystems in a transport vehicle
Types of ECU include Electronic/engine
Control Module (ECM), Powertrain Control
Module (PCM), Transmission Control
Module (TCM), Brake Control Module
(BCM or EBCM), Central Control Module
(CCM), Central Timing Module (CTM),
General Electronic Module (GEM),
Body Control Module (BCM), Suspension
Control Module (SCM), control unit, or
control module
ECU (Electronic Control Unit)
Electronic Control Module Example
9
Automotive Mechatronics
10
Non-hackable hackable
11
Throttle position sensor
Drive-by-wire system
12
Steering-by-wire system
Universal joint
Steer-by –wire
(with mechanical fallback clutch)
Automotive Control System Architecture
Vehicle CAN BUS System
Vehicle Communication System
OBDII
MOST
LIN
CAN
FlexRay
Bluetooth
Wifi
SubGHz
Infotainment
System
ESP TCU ACC
ESP(electronic stability program
TCU(transmission control unit)
ACC(adaptive cruise
control)
… CAN-C
网
Speedometer
CAN-B
Infotainment
System
Music Player
INS(Inertial navigation system
INS
EMU
EMU(engine management
system)
Seat Controller
Vehicle Communication System example
CAN BUS Signaling
CAN Frame Structure
0 dominant
1 recessive
1 1 1
1
01
1
1
1 0
0
0
1
1
1 0 0
0 0
0 0
CAN Bus Access Arbitration
Packets injection
Parameter spoofing
CAN BUS Attack
Jeep Uconnect Vulnerability
WiFifemotocellSprintInternet CAN
Remote Attack Example
CSW2017  jun li_car anomaly detection
CSW2017  jun li_car anomaly detection
Automotive intrusion detection researches
Automotive intrusion detection researches
Not considering
Temporal feature
CSW2017  jun li_car anomaly detection
Distributed
architecture
CAN总线安全防御模型
IDS
IDS(Intrusion Detection System)
① Real time requirements
② Hard to trace back to sender
③ High cost of false positive
④ …
Difficulties of CAN bus
defence
CAN Anomaly Detection McAfee&Intel
CAN bus defence
IDS
CAN security architecture
Bluetooth WiFi Cellular V2X
IDS
Experiment Car
•  Cellular Connection
•  Cloud Service
•  Bluetooth Key
•  Hybrid
•  Electronic Brake
•  Electric Power
Steering
•  Electronic Throttle
Experiment car’s CAN network
The CAN database
Why don’t we build a model
Take the relation ship of rpm and speed ,
gear for example,we can create a
model of the System‘s behavior
汽车工作原理
Anomaly detection system
Realtime data
stream
Cross
Prediction
Parameter
extraction
System model requirements
Gear
Build the system model
Data
Collection
Data
preprocess
Data
analysis
Feature
Selection
Model
Training
&Testing
Data
Acquisition Parameter presence on different BUS
Parameter	 Speed	
Engine	
RPM	
Acceleration	
Pedal	
Intake	
Pressure	
Brake	
Pedal	
Steering	
Wheel	
Gear	
BUS	
Instrument	 o	 o	 x	 x	 o	 o	 o	
Comfort	 o	 o	 x	 x	 o	 x	 x	
Power	 o	 o	 o	 o	 o	 x	 x	
ECM	 o	 o	 o	 o	 o	 x	 o	
ESC	 o	 o	 o	 x	 o	 o	 o
Data Acquisition Setup
Data Analysis Can database is kept highly confidential
Data Preprocess
Data Preprocess
Interpolation
Sampling
Normalization
Normalization
Must make sure the maximum and minimum value,don’t
calculate from the training data
数据插值
Observation
Interpolation
Sub-Sampling
Sub-SamplingTime_
ms
RPM Speed MAP MAF AccPeda
l Throttle
13897
3
0.287983
8
0.134259
2
0.059055
1
0.167567
5
0.697107
0
0.137795
2
13897
4
0.287312
5
0.134259
2
0.055118
1
0.167567
5
0.697107
0
0.137795
2
13897
5
0.287312
5
0.134259
2
0.051181
1
0.167567
5
0.697107
0
0.137795
2
13897
6
0.285970 0.134259
2
0.047244
0
0.167567
5
0.697107
0
0.137795
2
13897
7
0.285970 0.134259 0.051181
1
0.167567
5
0.697107
0
0.137795
2
Sub-Sampling
Model training
Model training
Results
Result
Model testing
Model testing
Acknowledgement
Professor Shuicheng Yan
Doctor Ming Lin
Doctor Zhanyi Wang
Doctor Lin Huang
Thank You!
Q&A
Reference
1.  Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern
Automobile, 2010
2.  Stephen Checkoway,Damon McCoy,Brian Kantor, Comprehensive Experimental
Analyses of Automotive Attack Surfaces,2011.
3.  Charlie Miller,Chris Valasek,Adventures in Automotive Networks and Control
Units,2013.
4.  Charlie Miller,Chris Valasek,Remote Exploitation of an Unaltered Passenger
Vehicle,2015
5.  Dieter Spaar,Sicherheitslücken bei BMWs ConnectedDrive/ Beemer, Open
Thyself! – Security vulnerabilities in BMW's ConnectedDrive,2015.
6.  Iamthecarvalry.org , Five Star Automotive Cyber Safety Framework,2015.
7.  Pierre Kleberger,Security Aspects of the In-Vehicle Network in the Connected
Car,IEEE Intelligent Vehicles Symposium,2011
8.  Marc Rogers,Kevin Mahaffey,How to Hack a Tesla Model S,DEF CON
23,2015
9.  Charlie Miller Chris Valasek,Advanced CAN Injection Techniques for Vehicle
Networks,BlackhatUSA,2016
10. Kyong-Tak Cho and Kang G. Shin, Fingerprinting Electronic Control Units for
Vehicle Intrusion Detection, 2016
11. Nobuyasu Kanekawa,X-by-Wire Systems,Hitachi Research Lab.2011
12. Paul Yih, Steer-by-Wire: Implication For Vehicle Handling and Safety,Stanford
PHD Dissertation,2005
13. Luigi Coppolion,Dependability aspects of automotive x-by-wire technologies,
2008.
14. Jonas Zaddach,Andrei Costin,Embedded Devices Security and Firmware Reverse
Engineering,Blackhat Workshop,2013.
15. Andrei costin,Jonas Zaddach,A large-Scale Analysis of the Security of
Embedded Firmwares,EURECOM,2014.
16. Samy Kamkar,Drive It Like You hacked It,DEF CON23,2015
17. David A Brown, Geoffrey Cooper, Automotive Security Best Practices, White
Paper by Intel & McAfee,2014.
18. OpenGarages, Car Hacker’s Handbook,openGarage.org,2014.
19. Henning Olsson, OptimumG,Vehicle Data Acquisition Using CAN,2010
20. Varun Chandola,Arindam Banerjee,Vipin Kumar,Anomaly Detection :A
Survey,2009
21. Park, Ming Kuang, Neural learning of driving environment prediction for vehicle
power management, Joint Conf. on Neural Networks, 2008.
22. Taylor, P., Adamu-Fika, F., Anand, S., Dunoyer, A., Griffiths, N., and Popham, T.
Road type classification through data mining,2012.
23. Michael Muter, Naim Asaj,Entropy-based anomaly detection for in-vehicle
networks", IEEE Intelligent Vehicles Symposium (IV), 2011.
24. Ulf E. Larson, Dennis K. Nilsson,An Approach to Specification-based Attack
Detection for In-Vehicle Networks, IEEE Intelligent Vehicles Symposium,2008.
25. Y. L. Murphey, Zhi Hang Chen, L. Kiliaris, Jungme ,I. Tang and T. P. Breckon,
Automatic road environment classication, IEEE Trans. on Intelligent
Transportation Systems, 2011.
26. Salima Omar, Asri Ngadi, Hamid H.Jebur, Machine Learning Techniques for
Anomaly Detection: An Overview.
27. Perter Harrington,Machine Learning In Action,2013.
28. Jurgen Schmidhuber, Deep learning in neural networks: An overview, 2015.
29. Kaiserslautern,Comparison of Unsupervised Anomaly Detection Techniques,
German Research Center for Artificial Intelligence, 2011
30. Sepp Hochreiter, Jurgen Schmidhuber, Long short-term memory,Neural
computation, 1997.
31. Michael Husken, Peter Stagge,Recurrent neural networks for time series
classifcation, Neurocomputing, 2003.
32. Felix A Gers, Jurgen Schmidhuber, Fred Cummins, Learning to forget:Continual
prediction with LSTM, Neural computation, 2000.
33. David E Rumelhart, Geo_rey E Hinton, and Ronald J Williams.,Learning
internal representations by error propagation,1985.
34. Christopher M Bishop,Pattern recognition and machine learning, springer, 2006.
35. Simon Haykin and Neural Network. A comprehensive foundation. Neural
Networks, 2004.
36. Eleazar Eskin,Andrew Arnold,Michael Prerau, A Geometric Framework for
Unsupervised Anomaly Detection-Detecting Intrusions in Unlabeled Data
tection-Detecting Intrusions in Unlabeled Data,2002.
37. Kingsly Leung, Christopher Leckie, Unsupervised Anomaly Detection in
Network Intrusion Detection Using Clusters, 2005

More Related Content

PPTX
Securing future connected vehicles and infrastructure
PPTX
Safe and secure autonomous systems
PPTX
Highly dependable automotive software
PPTX
Highly dependable automotive software
PDF
[Bucharest] From SCADA to IoT Cyber Security
PDF
Homeland of Things Framework BSides Augusta 2017
PPTX
Introduction to ICS/SCADA security
PPTX
Systems architecture with the functional safety/security emphasis
Securing future connected vehicles and infrastructure
Safe and secure autonomous systems
Highly dependable automotive software
Highly dependable automotive software
[Bucharest] From SCADA to IoT Cyber Security
Homeland of Things Framework BSides Augusta 2017
Introduction to ICS/SCADA security
Systems architecture with the functional safety/security emphasis

Viewers also liked (20)

PDF
CSW2017 chuanda ding_state of windows application security
PDF
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
PDF
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
PDF
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PDF
CSW2017 Harri hursti csw17 final
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
PDF
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
PDF
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
PDF
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
PDF
CSW2017 Scott kelly secureboot-csw2017-v1
PDF
CSW2017 Qidan he+Gengming liu_cansecwest2017
PDF
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
PDF
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
PDF
Csw2016 freingruber bypassing_application_whitelisting
PDF
Csw2016 chen grassi-he-apple_graphics_is_compromised
PDF
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
PDF
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
PDF
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017 chuanda ding_state of windows application security
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Harri hursti csw17 final
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 chen grassi-he-apple_graphics_is_compromised
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
Ad

Similar to CSW2017 jun li_car anomaly detection (20)

PPTX
Context-aware Automotive Intrusion Detection using Reference Models
PDF
Analyzing the Security of Cars Efficiently
PDF
Wfcs2019
PPTX
Automotive Security (Connected Vehicle Security Issues)
PDF
IRJET- Data Acquistion through Connectivities in Cars
PDF
IRJET- Data Acquistion through Connectivities in Cars
PPTX
Network Security for Automotive Embedded Systems
PPTX
Backdooring a car
PPTX
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
PDF
The Current State of Automotive Security by Chris Valasek
PPT
Automotive electronics Systems by Ravikumar Chilmula
PDF
Embedded Systems in Automotive
PDF
Automotive Electronics - Internals and Security Implications
DOCX
16.An Intelligent Data-Driven Model to Secure Intravehicle Communications Bas...
PPT
SC4 Workshop 1: Seán Gaines: Vehicle sensors
PPTX
2014 MATC Spring Lecture Series: Chris Schwarz
PDF
Suns Out Guns Out: Hacking without a Vehicle by Charlie Miller & Chris Valasek
PPTX
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
DOCX
thesis paper
PDF
Car hackers handbook
Context-aware Automotive Intrusion Detection using Reference Models
Analyzing the Security of Cars Efficiently
Wfcs2019
Automotive Security (Connected Vehicle Security Issues)
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
Network Security for Automotive Embedded Systems
Backdooring a car
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
The Current State of Automotive Security by Chris Valasek
Automotive electronics Systems by Ravikumar Chilmula
Embedded Systems in Automotive
Automotive Electronics - Internals and Security Implications
16.An Intelligent Data-Driven Model to Secure Intravehicle Communications Bas...
SC4 Workshop 1: Seán Gaines: Vehicle sensors
2014 MATC Spring Lecture Series: Chris Schwarz
Suns Out Guns Out: Hacking without a Vehicle by Charlie Miller & Chris Valasek
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
thesis paper
Car hackers handbook
Ad

More from CanSecWest (10)

PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PDF
Csw2016 song li-smart_wars
PDF
Csw2016 tang virtualization_device emulator testing technology
PDF
Csw2016 macaulay eh_trace-rop_hooks
PDF
Csw2016 d antoine_automatic_exploitgeneration
PDF
Csw2016 gawlik bypassing_differentdefenseschemes
PDF
Csw2016 wang docker_escapetechnology
PDF
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
PDF
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
CSW2017 Geshev+Miller logic bug hunting in chrome on android
Csw2016 song li-smart_wars
Csw2016 tang virtualization_device emulator testing technology
Csw2016 macaulay eh_trace-rop_hooks
Csw2016 d antoine_automatic_exploitgeneration
Csw2016 gawlik bypassing_differentdefenseschemes
Csw2016 wang docker_escapetechnology
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket

Recently uploaded (20)

PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
newyork.pptxirantrafgshenepalchinachinane
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Course Overview and Agenda cloud security
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPT
Ethics in Information System - Management Information System
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPT
12 Things That Make People Trust a Website Instantly
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
The Evolution of Traditional to New Media .pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
newyork.pptxirantrafgshenepalchinachinane
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Uptota Investor Deck - Where Africa Meets Blockchain
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Course Overview and Agenda cloud security
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Ethics in Information System - Management Information System
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
12 Things That Make People Trust a Website Instantly
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Exploring VPS Hosting Trends for SMBs in 2025
Alethe Consulting Corporate Profile and Solution Aproach
t_and_OpenAI_Combined_two_pressentations
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
The Evolution of Traditional to New Media .pdf

CSW2017 jun li_car anomaly detection