Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by
Li, Jiangtao
, Liu, Mengxiao
, Cao, Chenhong
, Li, Yufeng
in
Advanced driver assistance systems
/ Automobiles
/ buffer overflow vulnerability
/ Buffers
/ Communication
/ communication traffic
/ Communications traffic
/ Control algorithms
/ Denial of service attacks
/ Exploitation
/ Firmware
/ Intelligent vehicles
/ Internet of Things
/ Libraries
/ Mineral industry
/ Mining industry
/ Network security
/ Operating systems
/ Overflow
/ Risk communication
/ Software
/ Systems analysis
/ Third party
/ Vehicles
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by
Li, Jiangtao
, Liu, Mengxiao
, Cao, Chenhong
, Li, Yufeng
in
Advanced driver assistance systems
/ Automobiles
/ buffer overflow vulnerability
/ Buffers
/ Communication
/ communication traffic
/ Communications traffic
/ Control algorithms
/ Denial of service attacks
/ Exploitation
/ Firmware
/ Intelligent vehicles
/ Internet of Things
/ Libraries
/ Mineral industry
/ Mining industry
/ Network security
/ Operating systems
/ Overflow
/ Risk communication
/ Software
/ Systems analysis
/ Third party
/ Vehicles
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by
Li, Jiangtao
, Liu, Mengxiao
, Cao, Chenhong
, Li, Yufeng
in
Advanced driver assistance systems
/ Automobiles
/ buffer overflow vulnerability
/ Buffers
/ Communication
/ communication traffic
/ Communications traffic
/ Control algorithms
/ Denial of service attacks
/ Exploitation
/ Firmware
/ Intelligent vehicles
/ Internet of Things
/ Libraries
/ Mineral industry
/ Mining industry
/ Network security
/ Operating systems
/ Overflow
/ Risk communication
/ Software
/ Systems analysis
/ Third party
/ Vehicles
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
Journal Article
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However, mining buffer overflow (BOF) vulnerabilities in ADASs can be challenging since their code and data are not publicly available. In this study, we observed that ADAS devices commonly utilize unencrypted protocols for module communication, providing us with an opportunity to locate input stream and buffer data operations more efficiently. Based on the above observation, we proposed a communication-traffic-assisted ADAS BOF vulnerability mining and exploitation method. Our method includes firmware extraction, a firmware and system analysis, the locating of risk points with communication traffic, validation, and exploitation. To demonstrate the effectiveness of our proposed method, we applied our method to several commercial ADAS devices and successfully mined BOF vulnerabilities. By exploiting these vulnerabilities, we executed the corresponding commands and mapped the attack to the physical world, showing the severity of these vulnerabilities.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.