{"678727":{"#nid":"678727","#data":{"type":"news","title":"Scientists Find Vehicles Susceptible to Remote Cyberattacks in Award-Winning Paper","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003ECybersecurity researchers have discovered new vulnerabilities that could provide criminals with wireless access to the computer systems in automobiles, aircraft, factories, and other cyber-physical systems.\u003C\/p\u003E\u003Cp\u003EThe computers used in vehicles and other cyber-physical systems rely on a specialized internal network to communicate commands between electronics. Because it took place internally, it was traditionally assumed that attackers could only influence this network through physical access.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EIn collaboration with Hyundai, researchers from Georgia Tech\u2019s \u003Ca href=\u0022https:\/\/sites.gatech.edu\/capcpsec\/people\/\u0022\u003ECyber-Physical Systems Security Research Lab \u003C\/a\u003E(CPSec) observed that threat models used to evaluate the security of these technologies were outdated.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe team, led by Ph.D. student \u003Cstrong\u003EZhaozhou Tang\u003C\/strong\u003E, found that vehicle technology advancements allowed attackers to launch new attacks, improve existing attacks, and circumvent current defense systems.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EFor example, Tang\u2019s findings included the possibility for attackers to remotely compromise the computers used in cars and aircraft through Wi-Fi, cellular, Bluetooth, and other wireless channels.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cOur job was to thoroughly review existing information and find ways to protect against these attacks,\u201d he said. \u201cWe found new threats and proposed a defense system that can protect against the new and old attacks.\u201d\u003C\/p\u003E\u003Cp\u003EIn response to their findings, the team developed \u003Ca href=\u0022https:\/\/www.researchgate.net\/publication\/383876245_ERACAN_Defending_Against_an_Emerging_CAN_Threat_Model\u0022\u003EERACAN\u003C\/a\u003E, the first comprehensive defense system against this new generation of attackers. Designed to detect new and old attacks, ERACAN can deploy defenses when necessary.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe system also classifies the attacks it reacts to, providing security experts with the tools for detailed analysis. It has a detection rate of 100% for all attacks launched by conventional methods and detects enhanced threat models 99.7% of the time.\u003C\/p\u003E\u003Cp\u003EThe project received a distinguished paper award at the 2024 ACM Conference on Computer and Communications Security (CCS 24) held in Salt Lake City. Tang presented the paper at the October conference.\u003C\/p\u003E\u003Cp\u003E\u201cThis was Zhaozhou\u2019s first paper in his Ph.D. program, and he deserves recognition for his groundbreaking work on automotive cybersecurity,\u201d said \u003Ca href=\u0022https:\/\/sites.google.com\/site\/samanzonouz4n6\/saman-zonouz\u0022\u003E\u003Cstrong\u003ESaman Zonouz\u003C\/strong\u003E\u003C\/a\u003E, associate professor in the \u003Ca href=\u0022https:\/\/scp.cc.gatech.edu\/\u0022\u003ESchool of Cybersecurity and Privacy \u003C\/a\u003Eand the \u003Ca href=\u0022https:\/\/ece.gatech.edu\/\u0022\u003ESchool of Electrical and Computer Engineering\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe U.S. Department of Homeland Security has designated the transportation sector as one of the nation\u2019s 16 critical infrastructure sectors. Ensuring its security is vital to national security and public safety.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cModern vehicles, which rely heavily on controller area networks for essential operations, are integral components of this infrastructure,\u201d said Zonouz. \u201cWith the increasing sophistication of cyberthreats, safeguarding these systems has become critical to ensuring the resilience and security of transportation networks.\u201d\u003C\/p\u003E\u003Cp\u003EThis paper introduced to the scientific community the first comprehensive defense system to address advanced threats targeting vehicular controller area networks.\u003C\/p\u003E\u003Cp\u003EThe CPSec team is putting the technology it has developed into practice in collaboration with Hyundai America Technical Center, Inc., which sponsors the work. Tang hopes ERACAN\u2019s success will raise awareness of these new threats in the research community and industry.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cIt will help them build future defenses,\u201d he said. \u201cWe have demonstrated the best practice to defend against these attacks.\u201d\u003C\/p\u003E\u003Cp\u003ETang received his bachelor\u2019s degree at Georgia Tech, where he first performed security-related work for the automobile industry. While working with Zonouz on his master\u2019s degree, he decided to change course and pursue research initiatives like vehicle security in a Ph.D. program.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cIt is interesting how it came full circle,\u201d he said. \u201cI will continue on this path of automobile security throughout my Ph.D.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EERACAN: Defending Against an Emerging CAN Threat Model\u003C\/em\u003E, was written by \u003Cstrong\u003EZhaozhou Tang,\u003C\/strong\u003E \u003Cstrong\u003EKhaled Serag\u003C\/strong\u003E from the Qatar Computing Research Institute, \u003Cstrong\u003ESaman Zonouz\u003C\/strong\u003E, \u003Cstrong\u003EBerkay Celik\u003C\/strong\u003E and \u003Cstrong\u003EDongyan Xu\u003C\/strong\u003E from Purdue University, and \u003Ca href=\u0022https:\/\/ece.gatech.edu\/directory\/raheem-beyah\u0022\u003E\u003Cstrong\u003ERaheem Beyah\u003C\/strong\u003E\u003C\/a\u003E, professor and dean of the College of Engineering. The \u003Ca href=\u0022https:\/\/sites.gatech.edu\/capcpsec\/\u0022\u003ECPSec Lab\u003C\/a\u003E is a collaboration between the School of Cybersecurity and Privacy and the School of Electrical and Computer Engineering.\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech researchers, with Hyundai, uncovered wireless vulnerabilities in vehicles\u0027 internal networks. They developed ERACAN, a defense system with near-perfect attack detection, addressing new and old threats. The project, recognized at CCS 2024, highlights the urgent need to secure critical transportation systems.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers, with Hyundai, uncovered wireless vulnerabilities in vehicles\u0027 internal networks."}],"uid":"36253","created_gmt":"2024-12-02 20:29:45","changed_gmt":"2024-12-10 16:08:56","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2024-11-25T00:00:00-05:00","iso_date":"2024-11-25T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"675758":{"id":"675758","type":"image","title":"Saman Zonouz.jpg","body":null,"created":"1733171394","gmt_created":"2024-12-02 20:29:54","changed":"1733171394","gmt_changed":"2024-12-02 20:29:54","alt":"man in a pullover smiling","file":{"fid":"259421","name":"Saman Zonouz.jpg","image_path":"\/sites\/default\/files\/2024\/12\/02\/Saman%20Zonouz.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2024\/12\/02\/Saman%20Zonouz.jpg","mime":"image\/jpeg","size":20769150,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2024\/12\/02\/Saman%20Zonouz.jpg?itok=L0vEl8C_"}}},"media_ids":["675758"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660373","name":"School of Cybersecurity \u0026 Privacy (Do not use)"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"},{"id":"134","name":"Student and Faculty"},{"id":"193158","name":"Student Competition Winners (academic, innovation, and research)"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"167058","name":"Student"},{"id":"365","name":"Research"},{"id":"101","name":"Award"},{"id":"711","name":"car"},{"id":"518","name":"cars"},{"id":"623","name":"Technology"},{"id":"187915","name":"go-researchnews"},{"id":"188776","name":"go-research"},{"id":"10199","name":"Daily Digest"},{"id":"168414","name":"College of Engineering; School of Electrical and Computer Engineering; College of Computing"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"193652","name":"Matter and Systems"},{"id":"39501","name":"People and Technology"},{"id":"39541","name":"Systems"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ECommunications Officer II\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESchool of Cybersecurity and Privacy\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}