Development and Evaluation of CANBench: A Testbed for Assessing the Security of Automotive CAN Buses
Guardat en:
| Publicat a: | ProQuest Dissertations and Theses (2025) |
|---|---|
| Autor principal: | |
| Publicat: |
ProQuest Dissertations & Theses
|
| Matèries: | |
| Accés en línia: | Citation/Abstract Full Text - PDF |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3235011062 | ||
| 003 | UK-CbPIL | ||
| 020 | |a 9798290619729 | ||
| 035 | |a 3235011062 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 66569 |2 nlm | ||
| 100 | 1 | |a McClellan, Trevor S. | |
| 245 | 1 | |a Development and Evaluation of CANBench: A Testbed for Assessing the Security of Automotive CAN Buses | |
| 260 | |b ProQuest Dissertations & Theses |c 2025 | ||
| 513 | |a Dissertation/Thesis | ||
| 520 | 3 | |a Modern vehicles rely heavily on electronic control units (ECUs) that communicate via the controller area network (CAN) bus, a protocol developed in the 1980s with minimal security considerations. The growing number of ECUs has heightened the risk of cyberattacks on vehicles. Although CAN bus security has been extensively researched, the CAN standard still lacks built-in security measures. Furthermore, testing proposed security mechanisms is challenging due to the proprietary nature of automotive systems. To address this, an open-source physical testbed was developed using inexpensive, off-the-shelf components to support automotive CAN bus security research. The testbed provides a controlled environment for simulating and evaluating various attacks and defense mechanisms. It was assessed for functionality, reproducibility, and ease of use. Testing demonstrated the testbed’s ability to replay CAN traffic in near real-time and accurately simulate replay, spoofing, and denial of service attacks. Additionally, usability testing was conducted with individuals who had minimal experience with automotive networks. The participants successfully reproduced the tool and executed attacks using the provided documentation. These results highlight the testbed’s reproducibility, usability, and potential to advance future automotive security research. | |
| 653 | |a Software | ||
| 653 | |a Intrusion detection systems | ||
| 653 | |a Protocol | ||
| 653 | |a Communication | ||
| 653 | |a Systems design | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Access control | ||
| 653 | |a Fuzzy logic | ||
| 653 | |a Vehicles | ||
| 653 | |a User interface | ||
| 653 | |a Data integrity | ||
| 653 | |a Embedded systems | ||
| 653 | |a Reverse engineering | ||
| 653 | |a Confidentiality | ||
| 653 | |a Automobile safety | ||
| 653 | |a Computer engineering | ||
| 653 | |a Design | ||
| 653 | |a Denial of service attacks | ||
| 653 | |a Reproducibility | ||
| 653 | |a Digital signatures | ||
| 773 | 0 | |t ProQuest Dissertations and Theses |g (2025) | |
| 786 | 0 | |d ProQuest |t ProQuest Dissertations & Theses Global | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3235011062/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3235011062/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |