A Detailed Look at ‘I Think I CAN’

Abstract:

Components within modern automobiles communicate across a Controller Area Network (CAN), which has been demonstrated to be vulnerable to external adversarial attention. To better integrate effective security for the CAN protocol at the design level, the standard can be defined in temporal logic. Translating the temporal logic into a module for a real-time network emulator complements a greater goal to reduce security testing overhead. Comparing performance metrics while attempting to exploit modified CAN designs provides analysts with a readily accessible source of information as to whether a solution can be supported by module developers in industry.


AUTHORS

Photo of Adam J Brown

School of Computing University of South Alabama Mobile, AL, 
U.S.A

Adam J. Brown is a doctoral student at the University of South Alabama’s School of Computing. He earned a bachelor’s degree in Mathematics and Statistics from the University of South Alabama in 2007, and an MBA and JD from Florida State University in 2012.  His Research interests include cyber security, formal modelling, Cyber-Physical Systems (CPS), and cyber law.

 

Photo of Dr. Todd R. Andel

School of Computing University of South Alabama Mobile, AL
U.S.A

Dr. Todd R. Andel is a Professor at the University of South Alabama’s School of Computing. He previously served on the faculty of the Department of Electrical and Computer Engineering at the Air Force Institute of Technology from 2007 to 2012.  He is a retired major in the U.S. Air Force, serving more than 23 years specializing in cyber systems defense, research, and education.  He has published more than 50 peer-reviewed papers related to computer and information security, side-channel analysis, embedded systems security, network security protocols, and formal methods. He earned a bachelor’s degree in Computer Engineering from the University of Central Florida (1998), a master’s degree in Computer Engineering from the Air Force Institute of Technology (2002), and a doctorate in Computer Science from Florida State University (2007). He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and a senior member of the Association for Computing Machinery (ACM).

Dr. Jeffrey "Todd" McDonald

School of Computing University of South Alabama Mobile, AL
U.S.A

Dr. J. Todd McDonald is a Professor of Computer Science in the School of Computing at the University of South Alabama. He earned a bachelor’s degree in Computer Science from the U.S. Air Force Academy, a master’s degree in Computer Engineering from the Air Force Institute of Technology, and a doctorate in Computer Science from Florida State University. His primary research interests include software and hardware protection, systems assurance and vulnerability assessment, and secure software engineering.

Photo of Dr.  Mark Yampolskiy

School of Computing University of South Alabama Mobile, AL
U.S.A

Dr. Mark Yampolskiy is an Assistant Professor at the University of South Alabama. He earned a doctorate in Computer Science from Ludwig-Maximilians University in Munich, Germany. He is currently researching the security of Cyber-Physical Systems (CPS). His major research interest focuses on the security of additive manufacturing (3D Printing).

 

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com