The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
|
Author(s): Dennis K. Nilsson (Chalmers University of Technology, Sweden)and Ulf E. Larson (Chalmers University of Technology, Sweden)
Copyright: 2009
Volume: 1
Issue: 2
Pages: 14
Source title:
International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/jdcf.2009040103
Purchase
|
Abstract
The introduction of a wireless gateway as an entry point to the automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allows cyber attacks to target the unprotected network which currently lacks proper means for detecting and investigating security-related events. In this article, we discuss how to perform a digital forensic investigation of an in-vehicle network. An analysis of the current features of the network is performed, and an attacker model is developed. Based on the attacker model and a set of generally accepted forensic investigation principles, we derive a list of requirements for detection, data collection, and event reconstruction. We then use the Integrated Digital Investigation Process proposed by Carrier and Spafford (2004) as a template to illustrate how our derived requirements affect an investigation. For each phase of the process, we show the benefits of meeting the requirements and the implications of not complying with them.
Related Content
Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev.
© 2024.
17 pages.
|
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu.
© 2024.
13 pages.
|
Dawei Zhang.
© 2024.
16 pages.
|
Yuwen Zhu, Lei Yu.
© 2023.
16 pages.
|
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu.
© 2023.
14 pages.
|
Wenjun Yao, Ying Jiang, Yang Yang.
© 2023.
20 pages.
|
Dawei Zhang.
© 2023.
14 pages.
|
|
|