Towards Understanding and Characterizing Vulnerabilities in Intelligent Connected Vehicles through Real-World Exploits

📅 2026-01-02
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses the lack of systematic research on vulnerabilities in intelligent connected vehicles (ICVs), which has often been limited to isolated components and reliant on subjective analysis, failing to reflect real-world attack scenarios. For the first time, we conduct a large-scale empirical analysis based on 649 real-world exploitable vulnerabilities, integrating data from security competitions and researcher submissions. By employing vulnerability clustering, threat modeling, and risk stratification, we develop a comprehensive analytical framework encompassing six threat categories and four risk levels. Our investigation identifies one previously unreported vulnerability location and thirteen novel vulnerability types, extends and refines existing taxonomies, and bridges the gap between theory and practice. We also release a high-quality vulnerability dataset to support future ICV security research and policymaking.

Technology Category

Application Category

📝 Abstract
Intelligent Connected Vehicles (ICVs) are a core component of modern transportation systems, and their security is crucial as it directly relates to user safety. Despite prior research, most existing studies focus only on specific sub-components of ICVs due to their inherent complexity. As a result, there is a lack of systematic understanding of ICV vulnerabilities. Moreover, much of the current literature relies on human subjective analysis, such as surveys and interviews, which tends to be high-level and unvalidated, leaving a significant gap between theoretical findings and real-world attacks. To address this issue, we conducted the first large-scale empirical study on ICV vulnerabilities. We began by analyzing existing ICV security literature and summarizing the prevailing taxonomies in terms of vulnerability locations and types. To evaluate their real-world relevance, we collected a total of 649 exploitable vulnerabilities, including 592 from eight ICV vulnerability discovery competitions, Anonymous Cup, between January 2023 and April 2024, covering 48 different vehicles. The remaining 57 vulnerabilities were submitted daily by researchers. Based on this dataset, we assessed the coverage of existing taxonomies and identified several gaps, discovering one new vulnerability location and 13 new vulnerability types. We further categorized these vulnerabilities into 6 threat types (e.g., privacy data breach) and 4 risk levels (ranging from low to critical) and analyzed participants'skills and the types of ICVs involved in the competitions. This study provides a comprehensive and data-driven analysis of ICV vulnerabilities, offering actionable insights for researchers, industry practitioners, and policymakers. To support future research, we have made our vulnerability dataset publicly available.
Problem

Research questions and friction points this paper is trying to address.

Intelligent Connected Vehicles
vulnerability characterization
real-world exploits
security gap
systematic understanding
Innovation

Methods, ideas, or system contributions that make the work stand out.

Intelligent Connected Vehicles
Empirical Vulnerability Study
Real-World Exploits
Vulnerability Taxonomy
Security Dataset
🔎 Similar Papers
No similar papers found.
Y
Yuelin Wang
College of Intelligence and Computing, Tianjin University, China
Y
Yuqiao Ning
China Automobile Data of Tianjin Co., Ltd., China Automotive Technology & Research Center Co., Ltd., China
Y
Yanbang Sun
College of Intelligence and Computing, Tianjin University, China
Xiaofei Xie
Xiaofei Xie
Singapore Management University
Software EngineeringLoop AnalysisTestingDeep Learning
Zhihua Xie
Zhihua Xie
Reader in Computational Fluid Dynamics, Cardiff University
Computational Fluid DynamicsMultiphase FlowsTurbulenceHydraulicsCoastal Engineering
Y
Yang Chen
China Automobile Data of Tianjin Co., Ltd., China Automotive Technology & Research Center Co., Ltd., China
Z
Zhen Guo
China Automobile Data of Tianjin Co., Ltd., China Automotive Technology & Research Center Co., Ltd., China
S
Shihao Xue
China Automobile Data of Tianjin Co., Ltd., China Automotive Technology & Research Center Co., Ltd., China
Junjie Wang
Junjie Wang
Tianjin University
Vulnerability Detection
Sen Chen
Sen Chen
Professor, Nankai University
Software SecurityVulnerabilityMalwareSoftware Supply Chain Security