The introduction of Information and Communications Technologies (ICT) systems into vehicles brings security and privacy issues into the automotive domains. As a result, vehicles are subject to cyber-security attacks that may affect their capabilities impacting on the safety of drivers, passengers, and so on. In this paper, we focus on how to exploit security vulnerabilities affecting user-to-vehicle and intra-vehicle communications to hack the infotainment system to retrieve information about both vehicle and driver. Indeed, starting from a genuine Android APP, we inject into it a malicious APP acting as a Trojan-horse on the Android-based infotainment system to open a backdoor that allows an attacker to remotely access to the infotainment system. We use this back-door to hit the privacy of the driver by recording her voice and collect information circulating on the CAN bus about the vehicle.

A Social Engineering Attack to Leak Private Information from Android In-Vehicle Infotainment Systems

G Costantino;A La Marra;F Martinelli;I Matteucci
2018

Abstract

The introduction of Information and Communications Technologies (ICT) systems into vehicles brings security and privacy issues into the automotive domains. As a result, vehicles are subject to cyber-security attacks that may affect their capabilities impacting on the safety of drivers, passengers, and so on. In this paper, we focus on how to exploit security vulnerabilities affecting user-to-vehicle and intra-vehicle communications to hack the infotainment system to retrieve information about both vehicle and driver. Indeed, starting from a genuine Android APP, we inject into it a malicious APP acting as a Trojan-horse on the Android-based infotainment system to open a backdoor that allows an attacker to remotely access to the infotainment system. We use this back-door to hit the privacy of the driver by recording her voice and collect information circulating on the CAN bus about the vehicle.
2018
Istituto di informatica e telematica - IIT
automotive
cyber-security attack
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/347758
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact