Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach

by   Colin Urquhart, et al.

The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified.


page 1

page 2

page 3

page 6

page 7

page 10

page 11

page 13


An Overview of Attacks and Defences on Intelligent Connected Vehicles

Cyber security is one of the most significant challenges in connected ve...

Anomaly Detection in Intra-Vehicle Networks

The progression of innovation and technology and ease of inter-connectiv...

Security and Privacy Issues for Connected Vehicles

Modern vehicles contain more than a hundred Electronic Control Units (EC...

Who Killed My Parked Car?

We find that the conventional belief of vehicle cyber attacks and their ...

On the Robustness of Signal Characteristic-Based Sender Identification

Vehicles become more vulnerable to remote attackers in modern days due t...

Arduino Controlled Spy Robo Car using Wireless Camera With live Streaming

Nowadays, the technological and digital world is developing very fast. E...

Please sign up or login with your details

Forgot password? Click here to reset