UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 2
February-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2002400


Registration ID:
228563

Page Number

1315-1320

Share This Article


Jetir RMS

Title

CAR HACKING: THINK NOT, WHY HACK A DESKTOP WHEN YOU HACK A CAR?

Authors

Abstract

Abstract :As time passes by the scale of technology grows larger and smarter, this applies to vehicles too. In the present-day cars are increasingly being implemented with computers or ECU’s which are driven by millions of lines of code and control most of the critical systems even to an extent where the cars could drive by themselves. Completely packed under a interconnected internal networks most of the modern ECU’s now come with a “socketCAN / CAN bus” which have given an added advantage for exploiters. In the past a car could only be hacked if it had an vulnerable ECU but with introduction of “socketCAN / CAN bus” as a few vulnerabilities closed new ones we’re discovered, even though there exist IDS or intrusion detection systems it is practically very difficult for them to detect such attacks. Here in this paper as a proof of concept we’re going to present multiple ways to exploit different vulnerabilities using the “socketCAN / CAN bus” in a car which would also show how the vulnerabilities are exploited and executed and what can be taken over and answer a few intriguing questions such as can the throttle, breaks and steering would be controlled?, is it viable to control the car while it’s moving? , is it possible to lock up a person inside the car? And many more. And we would also present how a computer/ECU that was designed for safety be used for destruction with a few lines of code and tiny modifications to the system. And finally we try to find the best possible counter measures to overcome such attacks.

Key Words

socket CAN, CAN bus, exploits, vulnerability, car.

Cite This Article

"CAR HACKING: THINK NOT, WHY HACK A DESKTOP WHEN YOU HACK A CAR?", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 2, page no.1315-1320, February-2020, Available :http://www.jetir.org/papers/JETIR2002400.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CAR HACKING: THINK NOT, WHY HACK A DESKTOP WHEN YOU HACK A CAR?", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 2, page no. pp1315-1320, February-2020, Available at : http://www.jetir.org/papers/JETIR2002400.pdf

Publication Details

Published Paper ID: JETIR2002400
Registration ID: 228563
Published In: Volume 7 | Issue 2 | Year February-2020
DOI (Digital Object Identifier):
Page No: 1315-1320
Country: Banglore, KARNATAKA, India .
Area: Science
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002928

Print This Page

Current Call For Paper

Jetir RMS