such that the distance to other ECUs is maximized.
In terms of future work, many interesting ques-
tions and avenues for future research arise from this
work. In particular:
• J-1939: Heavy vehicles use the J-1939 standard
protocol (a layer above the CAN protocol). With
this protocol, we would have the advantage of be-
ing able to decode the protocol and count on the
“ground truth” for the experimental evaluation.
• Improvements in Performance: We will inves-
tigate the use of multiple edges to average multi-
ple estimates of the time shift and obtain a more
accurate measurement. Though the system can
determine the time shift upon the falling edge of
the start bit, it must wait until the ID has been
transmitted entirely before it can output a deci-
sion. Thus, all of these edges can be exploited to
take multiple measurements.
• On-the-fly Operation: This work produced a
proof-of-concept implementation that captures
data to be processed off-line. We will also work
towards an implementation with on-the-fly opera-
tion. This will provide a much deeper insight into
the practicality of our technique.
6 CONCLUSIONS
We presented a novel technique to identify the sender
in Controller Area Networks. The technique is highly
effective, as it relies on physical characteristics of an
ECU’s transmission that an attacker attempting to im-
personate the ECU cannot mimic. This constitutes an
important advantage over state-of-the-art approaches,
that are conceivably vulnerable to profile-and-mimic
attacks. The work includes an experimental evalua-
tion that confirms the feasibility and practicality of
our proposed technique.
ACKNOWLEDGEMENTS
The authors would like to thank Lorin Maran for his
valuable assistance with the vehicle’s instrumenta-
tion. We would also like to thank Arthur Chung for
his valuable guidance and discussions regarding our
high-frequency board design.
REFERENCES
Blood, W. R., Jr. (1988). MECL System Design Handbook
(HB205/D, Rev. 1A).
Checkoway, S. et al. (2011). Comprehensive Experimental
Analyses of Automotive Attack Surfaces. In USENIX
Security Symposium.
Cho, K.-T. and Shin, K. G. (2016). Fingerprinting Elec-
tronic Control Units for Vehicle Intrusion Detection.
In USENIX Security Symposium.
Cho, K.-T. and Shin, K. G. (2017). Viden: Attacker Iden-
tification on In-Vehicle Networks. In Proceedings of
the 2017 ACM SIGSAC Conference on Computer and
Communications Security, pages 1109–1123. ACM.
Groza, B., Murvay, S., Herrewege, A. V., and Ver-
bauwhede, I. (2017). LiBrA-CAN: Lightweight
Broadcast Authentication for Controller Area Net-
works. ACM Transactions on Embedded Computing
Systems, 16(3):90:1–90:28.
Horowitz, P. and Hill, W. (2015). The Art of Electronics.
Cambridge University Press, Third edition.
Kneib, M. and Huth, C. (2018). Scission: Signal
Characteristic-Based Sender Identification and Intru-
sion Detection in Automotive Networks. In ACM
SIGSAC Conference on Computer and Communica-
tions Security. ACM.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., et al. (2010). Experimental Security
Analysis of a Modern Automobile. In IEEE Sympo-
sium on Security and Privacy, pages 447–462. IEEE.
McAfee (2015). Automotive Security Best Practices.
Miller, C. and Valasek, C. (2015). Remote Exploitation of
an Unaltered Passenger Vehicle.
Miller, C. and Valasek, C. (2016). Advanced CAN Injection
Techniques for Vehicle Networks.
Mukherjee, S., Shirazi, H., Ray, I., Daily, J., and Gamble,
R. (2016). Practical DoS Attacks on Embedded Net-
works in Commercial Vehicles. In International Con-
ference on Information Systems Security, pages 23–
42. Springer.
Murvay, P.-S. and Groza, B. (2014). Source Identification
Using Signal Characteristics in Controller Area Net-
works. IEEE Signal Processing Letters, 21(4):395–399.
Petit, J. and Shladover, S. (2015). Potential Cyberattacks
on Automated Vehicles. IEEE Transactions on Intel-
ligent Transportation Systems, 16(2):546–556.
Pike, L., Sharp, J., Tullsen, M., Hickey, P. C., and Bielman,
J. (2015). Securing the Automobile: a Comprehensive
Approach. In Embedded Security in Cars (ESCAR)
Conference.
Press, W., Teukolsky, S., Vetterling, W., and Flannery, B.
(1992). Numerical Recipes in C. Cambridge Univer-
sity Press, Second edition.
Robert Bosch GmbH (1991). CAN Specification, Version 2.0.
SAE (2016). Cybersecurity Guidebook for Cyber-Physical
Vehicle Systems.
Sagong, S. U., Ying, X., Clark, A., Bushnell, L., and
Poovendran, R. (2018). Cloaking the Clock: Emu-
lating Clock Skew in Controller Area Networks. In
Proceedings of the 9th ACM/IEEE International Con-
ference on Cyber-Physical Systems, pages 32–42.
Van Herrewege, A., Singelee, D., and Verbauwhede, I.
(2011). CANAuth: A Simple, Backward Compati-
ble Broadcast Authentication Protocol for CAN Bus.
In ECRYPT Workshop on Lightweight Cryptography.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
604