4.8 Article

eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles

出版社

ELSEVIER
DOI: 10.1016/j.jksuci.2021.05.005

关键词

Autonomous vehicle; Malicious software; Over-the-air; Software update; Uptane framework

资金

  1. Higher Education Com- mission (HEC) of Pakistan [NRPU-5946]

向作者/读者索取更多资源

This article discusses the importance of software updates in autonomous vehicles and proposes an enhanced uptane framework for detecting malicious OTA software updates. By incorporating convolutional neural networks, the framework improves security and accuracy. The authors create two datasets by collecting executables of Windows and Linux operating systems and encourage the use of transfer learning to detect malicious executable files. Finally, the authors benchmark the CNN models and emphasize the significance of this work in providing a secure mechanism for software updates to the community.
Software updates are highly significant in autonomous vehicles. These updates are utilized to provide enhanced features and updated security mechanisms. In order to ensure scalability and smooth roll-out Over-the-air (OTA) mechanism is a preferred option to propagate a software update. However, this approach is vulnerable to security attacks because of existence of wireless communication channel between the vehicle and the manufacturer. In that, an attacker can replace the legitimate software with a malicious software with an intent to get control over the vehicle. In this work, we are motivated to address this problem. We develop an enhanced uptane framework for detection of malicious OTA soft-ware updates in autonomous vehicles. For enhancing security, we incorporate convolutional neural net-work (CNN) in the uptane framework. The proposed framework is able to distinguish between malicious and benign software executables with high accuracy. For training and testing, we create two datasets by collecting executables of Windows and Linux operating system. We encourage the use of transfer learn-ing by exploiting the developed CNN models in order to detect malicious executable designed for auton-omous vehicles. We also benchmark the CNN models against state-of-the art models. Our work is highly beneficial for the community in providing a secure mechanism for software updates.(c) 2021 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据