Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3026724.3026732acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicinsConference Proceedingsconference-collections
research-article

Study of Car Dash Cam Security Vulnerabilities

Published: 28 December 2016 Publication History

Abstract

Nowadays, wireless networking features are being used widely, also used in the Car Dash Cams. However, because of the introduction of wireless networking system, it generated a lot of new forms of security vulnerabilities and issues which were not in the conventional Car Dash Cams. This study derives the security vulnerabilities of the Car Dash Cam's firmware which have the wireless networking feature. In addition, by analyzing the packet that is used for communication between the smart phone applications and a Car Dash Cams, this study analyses the bypassing method of authentication and presents the risks of the above vulnerabilities. In the point of view of Car Dash Cams which have the wireless networking feature are not fully discussed before, this study is expected to be a meaningful study.

References

[1]
Adam Shostack, "Threat Modeling: Designing for Security", 2014
[2]
Inhwan Han, "Car Dash Cam Standard Trend and Strategy", Korea Standard Association, 2005
[3]
Moosoep Kim, Sookil Cheo, Chiyoon Jung, Jongwook Han, "A Study on the Security Issues in the Automotive Black Box", 2012
[4]
Jinho Lee, "Threat Modeling Method's Technical Trend for Developing Secure Software", 2015
[5]
Jinho Lee, "Threat Modeling Method for Secure Embedded Software Development", 2014
[6]
Jungho Eom, "A Study on the Threat Assessment Method using Attack Tree", 2012
[7]
Janghyeok Yun, Jinil Kim, "Implementation of A Car Video Blackbox System using Smartphone", 2010
[8]
Inhwan Han, "Patent Analysis and Standardization Methods of Automobile Black Box Technology", 2007
[9]
Youngsuk Kim, Youngmin Kwon, "Implementation of Embedded POC UA Server for interoperation in EtherCAT", 2016
[10]
Yungyu Kim, Bumhan Kim, Donghoon Lee, "Real-time Integrity for Vehicle Black Box System", 2009

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICINS '16: Proceedings of the 4th International Conference on Information and Network Security
December 2016
110 pages
ISBN:9781450347969
DOI:10.1145/3026724
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • UPM: Universiti Putra Malaysia

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Car Dash Cam
  2. Embedded System
  3. IoT
  4. Security
  5. Vulnerability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICINS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 330
    Total Downloads
  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)2
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media