Skip to main content

Showing 1–6 of 6 results for author: Hollifield, S C

.
  1. arXiv:2306.15588  [pdf

    cs.CR eess.SY

    Develo** and Deploying Security Applications for In-Vehicle Networks

    Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone

    Abstract: Radiological material transportation is primarily facilitated by heavy-duty on-road vehicles. Modern vehicles have dozens of electronic control units or ECUs, which are small, embedded computers that communicate with sensors and each other for vehicle functionality. ECUs use a standardized network architecture--Controller Area Network or CAN--which presents grave security concerns that have been e… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: 10 pages, PATRAM 22

  2. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  3. Time-Based CAN Intrusion Detection Benchmark

    Authors: Deborah H. Blevins, Pablo Moriano, Robert A. Bridges, Miki E. Verma, Michael D. Iannacone, Samuel C Hollifield

    Abstract: Modern vehicles are complex cyber-physical systems made of hundreds of electronic control units (ECUs) that communicate over controller area networks (CANs). This inherited complexity has expanded the CAN attack surface which is vulnerable to message injection attacks. These injections change the overall timing characteristics of messages on the bus, and thus, to detect these malicious messages, t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures

    Journal ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021

  4. A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset

    Authors: Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs

    Abstract: Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions on CANs. Producing vehicular CAN data with a variety of intrusions is out of reach for most researchers as it requires expensive assets and expertise. To assist researchers, we… ▽ More

    Submitted 7 February, 2024; v1 submitted 28 December, 2020; originally announced December 2020.

    Comments: title changed and author added from original version

    Journal ref: PLoS one 19, no. 1 (2024): e0296879

  5. arXiv:2006.05993  [pdf, other

    cs.OH eess.SP

    CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data

    Authors: Miki E. Verma, Robert A. Bridges, Jordan J. Sosnowski, Samuel C. Hollifield, Michael D. Iannacone

    Abstract: CANs are a broadcast protocol for real-time communication of critical vehicle subsystems. Original equipment manufacturers of passenger vehicles hold secret their map**s of CAN data to vehicle signals, and these definitions vary according to make, model, and year. Without these map**s, the wealth of real-time vehicle information hidden in the CAN packets is uninterpretable, impeding vehicle-re… ▽ More

    Submitted 22 June, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

  6. arXiv:1811.07897  [pdf, other

    cs.OH stat.AP

    ACTT: Automotive CAN Tokenization and Translation

    Authors: Miki E. Verma, Robert A. Bridges, Samuel C. Hollifield

    Abstract: Modern vehicles contain scores of Electrical Control Units (ECUs) that broadcast messages over a Controller Area Network (CAN). Vehicle manufacturers rely on security through obscurity by concealing their unique map** of CAN messages to vehicle functions which differs for each make, model, year, and even trim. This poses a major obstacle for after-market modifications notably performance tuning… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: 5th Annual Conference on Computational Science & Computational Intelligence (CSCI'18)