Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach. Urquhart, C., Bellekens, X., Tachtatzis, C., Atkinson, R., Hindy, H., & Seeam, A. IEEE Access, 7:146057–146069, 2019.
Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach [link]Paper  doi  abstract   bibtex   
The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . .). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified.
@article{urquhart_cyber-security_2019,
	title = {Cyber-{Security} {Internals} of a {Skoda} {Octavia} {vRS}: {A} {Hands} on {Approach}},
	volume = {7},
	issn = {2169-3536},
	shorttitle = {Cyber-{Security} {Internals} of a {Skoda} {Octavia} {vRS}},
	url = {https://ieeexplore.ieee.org/document/8848400/},
	doi = {10.1109/ACCESS.2019.2943837},
	abstract = {The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . .). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified.},
	language = {en},
	urldate = {2020-05-21},
	journal = {IEEE Access},
	author = {Urquhart, Colin and Bellekens, Xavier and Tachtatzis, Christos and Atkinson, Robert and Hindy, Hanan and Seeam, Amar},
	year = {2019},
	pages = {146057--146069}
}

Downloads: 0