Candy Cream Exploy

Demo - haCking infotAiNment AnDroid sYstems to Command - a cura di ILARIA MATTEUCCI e GIANPIERO COSTANTINO - instRument clustEr via cAn data fraMe
Modern vehicles functionalities are regulated by Electronic Control Units (ECU), from a few tens to a hundred, commonly interconnected through the Controller Area Network (CAN) communication protocol. CAN is not secure-by-design: authentication, integrity and confidentiality are not considered in the design and implementation of the protocol. This represents one of the main vulnerability of modern vehicle: getting the access (physical or remote) to CAN communication allows a possible malicious entity to inject unauthorised messages on the CAN bus. These messages may lead to unexpected and possible very dangerous behaviours of the target vehicle. In this conference, we present CANDY CREAM, an attack made of two parts: CANDY aims at exploiting a misconfiguration of an infotainment system based on Android OS connected to the vehicle’s CAN bus network, and CREAM, a post-exploitation script that injects customized CAN frame to alter the behaviour of the vehicle.
LINK: -sito del gruppo: -video dell’attacco:
Saluti di Luca Chiantore Settore Città Intelligente e Progetti telematici Comune di Modena

Azioni sul documento

pubblicato il 2019/09/11 13:13:00 GMT+1 ultima modifica 2020-02-12T11:48:00+01:00