1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

Research Article

Conducting forensic investigations of cyber attacks on automobile in-vehicle networks

  • @INPROCEEDINGS{10.4108/e-forensics.2008.32,
        author={Dennis K.  Nilsson and Ulf E.  Larson},
        title={Conducting forensic investigations of cyber attacks on automobile in-vehicle networks},
        proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia},
        publisher={ACM},
        proceedings_a={E-FORENSICS},
        year={2010},
        month={5},
        keywords={Forensics vehicle in-vehicle network investigation data requirements},
        doi={10.4108/e-forensics.2008.32}
    }
    
  • Dennis K. Nilsson
    Ulf E. Larson
    Year: 2010
    Conducting forensic investigations of cyber attacks on automobile in-vehicle networks
    E-FORENSICS
    ACM
    DOI: 10.4108/e-forensics.2008.32
Dennis K. Nilsson1,*, Ulf E. Larson1,*
  • 1: Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden.
*Contact email: dennis.nilsson@ce.chalmers.se, ulf.larson@chalmers.se

Abstract

The introduction of the wireless gateway as an entry point to an automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allows cyber attacks to target the unprotected network, which currently lacks proper means for detecting and investigating security-related events. In this paper, we discuss the specifics of performing a digital forensic investigation of an in-vehicle network. An analysis of the current features of the network is performed, and an attacker model is developed. Based on the attacker model and a set of generally accepted forensic investigation principles, we derive a list of requirements for detection, data collection, and event reconstruction. We then use Brian Carrier's Digital Crime Scene Model as a template to illustrate how the requirements affect an investigation. For each phase of the model, we show the benefits of meeting the requirements and the implications of not complying with them.