CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus

πŸ“… 2025-07-19
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
CAN bus protocols lack built-in security mechanisms and are highly vulnerable to denial-of-service (DoS) attacks; conventional cryptographic and authentication approaches are impractical due to resource constraints and protocol immutability. This paper proposes a lightweight, hardware-assisted intrusion detection method leveraging Hardware Performance Counters (HPCs)β€”the first such application in automotive CAN environments. By monitoring microarchitectural anomalies during CAN frame processing, the approach detects attacks without modifying the CAN protocol stack. Implemented on a gem5-based RISC-V platform with FreeRTOS scheduling, the system integrates AES-128 encryption tasks to emulate realistic workloads and employs correlation analysis to optimize the HPC feature set. Experimental evaluation demonstrates high detection accuracy for DoS attacks with minimal runtime overhead (<3% CPU utilization), significantly enhancing CAN bus security. The method provides a practical, deployable hardware-assisted security augmentation for intelligent connected vehicles.

Technology Category

Application Category

πŸ“ Abstract
The Controller Area Network (CAN) protocol, essential for automotive embedded systems, lacks inherent security features, making it vulnerable to cyber threats, especially with the rise of autonomous vehicles. Traditional security measures offer limited protection, such as payload encryption and message authentication. This paper presents a novel Intrusion Detection System (IDS) designed for the CAN environment, utilizing Hardware Performance Counters (HPCs) to detect anomalies indicative of cyber attacks. A RISC-V-based CAN receiver is simulated using the gem5 simulator, processing CAN frame payloads with AES-128 encryption as FreeRTOS tasks, which trigger distinct HPC responses. Key HPC features are optimized through data extraction and correlation analysis to enhance classification efficiency. Results indicate that this approach could significantly improve CAN security and address emerging challenges in automotive cybersecurity.
Problem

Research questions and friction points this paper is trying to address.

Detects DoS attacks on automotive CAN bus using HPCs
Enhances CAN security with optimized HPC feature analysis
Addresses vulnerabilities in CAN protocol for autonomous vehicles
Innovation

Methods, ideas, or system contributions that make the work stand out.

Uses Hardware Performance Counters for anomaly detection
Simulates RISC-V CAN receiver with gem5
Optimizes HPC features via correlation analysis
πŸ”Ž Similar Papers
No similar papers found.