Vulnerabilities of Android OS-Based Telematics System
- Authors
- Jo, Hyo Jin; Choi, Wonsuk; Na, Seoung Yeop; Woo, Samuel; Lee, Dong Hoon
- Issue Date
- 2월-2017
- Publisher
- SPRINGER
- Keywords
- Telematics communication; Controller Area Network; Android; Smart vehicle; Open platform
- Citation
- WIRELESS PERSONAL COMMUNICATIONS, v.92, no.4, pp.1511 - 1530
- Indexed
- SCIE
SCOPUS
- Journal Title
- WIRELESS PERSONAL COMMUNICATIONS
- Volume
- 92
- Number
- 4
- Start Page
- 1511
- End Page
- 1530
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/84843
- DOI
- 10.1007/s11277-016-3618-9
- ISSN
- 0929-6212
- Abstract
- Intelligent vehicle technologies have been developed rapidly. Modern vehicles include many Electronic Control Units (ECUs) and in-vehicle networks. While these technologies offer accurate vehicle control and increase the convenience and safety of drivers, their vulnerabilities also have been analyzed and exploited. Nevertheless, open platforms, such as the Android OS, have been introduced into vehicle systems without careful consideration about security issues. In this paper, we indicate the security problems of an Android OS-based telematics system. Our target device's firmware is offered on a public Web site and is easily analyzed using public analysis tools. This means that our analysis methods are more scalable and practical than previous ones for remote attacks that require difficult analysis skills, such as signal processing and reverse engineering. We also found that the device allows malicious firmware to be updated because of a problem related to misuse of certificates. Furthermore, we conducted attack experiments using a real vehicle.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.