2012 IR&D Annual Report

Detection of Malware on Vehicular Networks, 10-R8281

Principal Investigators
Mark J. Brooks
Marisa C. Ramon
Tam T. Do
Nakul Jeirath

Inclusive Dates:  01/01/12 – Current

Background — Computers are becoming increasingly prevalent in modern automobiles. By some estimates, even low-end cars contain anywhere from 30 to 50 of these automobile computers, also known as electronic control units (ECUs). ECUs control everything from the in-car entertainment system to the braking system and the engine fuel-air mixture. Wireless connectivity in these computers is also becoming more common, with some vehicles having capabilities for cellular, Bluetooth, and even Wi-Fi connections. Given this increasing sophistication and connectivity, the modern automobile is fertile ground for the same sort of malware and malicious attacks that are usually associated with traditional computers.

Figure 1. Potential Exploit Vectors and Busses Present on a Vehicle
Figure 1. Potential Exploit Vectors and Busses Present on a Vehicle

Figure 2. SwRI's Vehicle Security Test Lab
Figure 2. SwRI's Vehicle Security Test Lab

Approach — The primary objective of this investigation is to demonstrate the beginning steps toward a system of vehicular malware detection. As a result of this investigation, it is expected one or more prototype algorithms will be produced that can effectively detect the presence of vehicle malware. This is expected to further SwRI's understanding of vehicle exploitation tools and techniques and position the project team to present their results at a major relevant conference.

Accomplishments — A vehicle security test bed has been established with several Controller Area Network (CAN) analyzer tools, several infotainment ECUs, a vehicle, and an oscilloscope with a CAN-specific analyzer. Several wireless tools were also acquired for the test bed for connecting to vehicle infotainment devices.

Using the test bed, the project team investigated vehicle vulnerabilities, patterns of malware, and detection algorithms.

  • Researched vulnerabilities in the ID3 tags in the MP3 files, USB vulnerabilities, Bluetooth vulnerabilities, and Wi-Fi vulnerabilities in the infotainment ECU.
  • Investigated various malware pieces running on the infotainment ECU platform. These malware pieces attempt to reach the CAN bus once a vulnerability has been exploited.
  • Recorded sample CAN traffic in a variety of scenarios and used this data to begin creating several detection algorithms based upon traffic variations. In order to test the detection algorithms, a prototype detector framework is being developed that will be used to test the detection algorithms on the CAN bus.
Benefiting government, industry and the public through innovative science and technology
Southwest Research Institute® (SwRI®), headquartered in San Antonio, Texas, is a multidisciplinary, independent, nonprofit, applied engineering and physical sciences research and development organization with 11 technical divisions.
03/19/13