REAL-TIME ACTIVE THREAT VALIDATION MECHANISM FOR VEHICLES
First Claim
1. A vehicle system, comprising:
- multiple electronic control units (ECUs) configured to manage operation of multiple vehicle components;
a controller area network (CAN) bus that provides communication pathways between the multiple ECUs; and
a threat validation module configured to;
receive a message from an electronic control unit (ECU) of the multiple ECUs, wherein the message comprises data of a suspicious message flagged by the ECU,generate a query to determine authenticity of the message,broadcast the query to at least one ECU of the multiple ECUs,listen for responses from the at least one ECU, anddetermine whether the suspicious message is an actual threat based at least on a count of received responses.
1 Assignment
0 Petitions
Accused Products
Abstract
A vehicle system, comprising multiple electronic control units (ECUs) configured to manage operation of multiple vehicle components, a controller area network (CAN) bus that provides communication pathways between the multiple ECUs, and a threat validation module configured to receive a message from an electronic control unit (ECU) of the multiple ECUs, wherein the message comprises data of a suspicious message flagged by the ECU, generate a query to determine authenticity of the message, broadcast the query to at least one ECU of the multiple ECUs, listen for responses from the at least one ECU, and determine whether the suspicious message is an actual threat based at least on a count of received responses.
24 Citations
20 Claims
-
1. A vehicle system, comprising:
-
multiple electronic control units (ECUs) configured to manage operation of multiple vehicle components; a controller area network (CAN) bus that provides communication pathways between the multiple ECUs; and a threat validation module configured to; receive a message from an electronic control unit (ECU) of the multiple ECUs, wherein the message comprises data of a suspicious message flagged by the ECU, generate a query to determine authenticity of the message, broadcast the query to at least one ECU of the multiple ECUs, listen for responses from the at least one ECU, and determine whether the suspicious message is an actual threat based at least on a count of received responses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising using at least one hardware processor of a vehicle system for:
-
receiving a message comprising data of a suspicious message that was flagged as suspicious by an electronic control unit (ECU); generating a query to determine authenticity of the suspicious message; broadcasting the query via a controller area network (CAN) bus to at least one ECU coupled to the CAN bus; listening for responses from the at least one ECUs; and determining whether the suspicious message is an actual threat based at least on a count of received responses. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for vehicular test generation, the computer program product comprising a non-transitory computer-readable storage medium having program code embodied therewith, the program code executable by at least one hardware processor to:
-
receiving a message comprising data of a suspicious message that was flagged as suspicious by an electronic control unit (ECU); generate a query to determine authenticity of the suspicious message; broadcast the query on a central access network (CAN) bus to at least one ECU; listen for responses from the at least one ECU; and determine whether the suspicious message is an actual threat based at least on a count of received responses. - View Dependent Claims (17, 18, 19, 20)
-
Specification