Research Article
Enhanced Android App-Repackaging Attack on In-Vehicle Network
Table 3
Analysis of proposed attack model using Cyber Kill Chain.
| Reconnaissance | (i) Analysis of vehicle control packet (using a diagnostic device) | (ii) Analysis of an Android app for vehicles | (iii) Analysis of ELM327 protocol |
| Weaponization | (i) Repacking the Android app for vehicles |
| Delivery | (i) Distribution to third-party app market |
| Exploitation Installation | (i) User downloads and installs the app on his/her smartphone |
| Command & Control | (i) Analysis of vehicle operation state through the in-vehicle network packets |
| Actions on Objectives | (i) Forced control of the automotive E/E system, causing a traffic accident |
|
|