Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection
Abstract
:1. Introduction
- Integration of CHERI Capabilities: Demonstrating the application of CHERI to enforce memory protection, preventing unauthorized access to IDS configurations.
- The 100% Prevention of IDS Rule Manipulation: Ensuring rule integrity under simulated attack scenarios, including IP spoofing and rule tampering.
- Real-Time Detection of Spoofing Attacks: Accurate anomaly detection with minimal performance overhead, ensuring suitability for real-time automotive environments.
- Evaluation on Realistic Automotive Scenarios: Simulation of ECUs and attack models to validate the effectiveness of the proposed system, adhering to AUTOSAR standards.
2. Background
2.1. CHERI Project Overview
2.2. CHERI and ARM Morello Technologies
2.2.1. CHERI Architecture Overview
- Principle of Least Privilege: This principle ensures that each component operates with only those permissions required to perform its function, thus reducing the attack surface area and limiting the damage in case of compromise. In automotive cybersecurity, this becomes even more important to ensure that sensitive subsystems, such as IDS rule configurations and ECU communications, are protected. By keeping each process strictly within its predefined boundaries, CHERI hardware prevents unauthorized accesses to critical memory regions. For example, the capability model of CHERI prevents an attempt by a compromised ECU to access the IDS rules or manipulate configurations and thus isolates and contains the threat.
- Principle of Intentional Use: A principle that enforces the explicit declaration of permissions and memory accesses so that actions actually carried out by a program are intentional and well authorized. This rules out ambiguities that result in misusing or exploiting privileges, such as the confused deputy problem. Scientific studies have shown that intentional use policies can greatly enhance system robustness since it ensures every action follows some predetermined constraints set in security [19,20].
2.2.2. CHERI Enhancements and Implementation
- Memory Protection: By attaching bounds and permission bits to pointers, CHERI ensures spatial memory safety, preventing unauthorized access beyond designated memory regions.
- Software Compartmentalization: CHERI supports the isolation of software components, enabling secure interaction between mutually untrusting programs or processes.
- Tagged Memory: This feature ensures that capabilities cannot be forged or corrupted, as the hardware tracks their validity independently of their location in memory.
2.2.3. ARM Morello: A Prototype for Commercial Application
- Compatibility with Existing Software: Morello provides a hybrid execution environment, enabling unmodified ARMv8-A applications to coexist with CHERI-enhanced programs. This compatibility reduces adoption barriers for developers and organizations.
- Enhanced Security Properties: By integrating CHERI capabilities, Morello strengthens security guarantees for memory safety, compartmentalization, and access control at the hardware level.
- Performance Considerations: ARM Morello demonstrates that CHERI’s additional security features can be implemented with minimal performance overhead, making it viable for real-time systems like those in automotive networks.
2.3. IP Spoofing and IDS Rule Manipulation
3. Literature Review
4. Methodology
4.1. CHERI in Automotive Security Applications
4.2. CHERI Capability Usage
- data is allocated at address 0x20 with a value of 5.
- critical_data is allocated at address 0x24 with a value of 2023.
Implementation: CHERI Usage on IDS
4.3. Memory-Protected IDS
Listing 1. Function to check ECU rules using CHERI capabilities. | |
1 | int check_ecu_rule ( const char ∗src_ip, const struct someip_packet ∗ someip_pkt ) { |
2 | for ( int i = 0; i < 5; i++) { |
3 | const char ∗ ecu_ip = (const char ∗) ecu_memory [i]-> ecu_ip; // Access protected by~ CHERI |
4 | |
5 | // Match source IP and packet attributes |
6 | if (strcmp (src_ip, ecu_ip) == 0 && |
7 | ntohs (someip_pkt -> method_id) == ecu_memory [i]-> method_id && |
8 | ntohs (someip_pkt -> client_id) == ecu_memory [i]-> client_id && |
9 | ntohs (someip_pkt -> session_id) == ecu_memory [i]-> session_id) { |
10 | return i; // Rule matched |
11 | } |
12 | } |
13 | return -1; // No match found (potential spoofed packet) |
14 | } |
Listing 2. Function to initialize ECU memory with CHERI capabilities. | |
1 | void initialize_ecu_memory () { |
2 | for (int i = 0; i < 5; i++) { |
3 | // Allocate memory with CHERI capabilities |
4 | ecu_memory [i] = (struct ecu_rule ∗ __capability) malloc (sizeof (struct ecu_rule)); |
5 | if (! ecu_memory [i]) { |
6 | perror (" Failed ␣to␣ allocate ␣ memory ␣for␣ECU ␣ rule "); |
7 | exit (EXIT_FAILURE); |
8 | } |
9 | } |
10 | |
11 | // Assign rules and enforce bounds |
12 | ecu_memory [0]-> ecu_ip = (char ∗ __capability) cheri_setbounds (" 192.168.1.11 ", sizeof (" 192.168.1.11 ")); |
13 | ecu_memory [0]-> method_id = 0 x1234; |
14 | ecu_memory [0]-> client_id = 0 x5678; |
15 | ecu_memory [0]-> session_id = 0 x9abc; |
16 | } |
Listing 3. Function to process packets and validate against ECU rules. | |
1 | void process_packet (u_char ∗args, const struct pcap_pkthdr ∗header, const u_char ∗ packet) { |
2 | struct ip ∗ ip_hdr = (struct ip ∗)(packet + 14); // Parse IP header |
3 | char src_ip [INET_ADDRSTRLEN]; |
4 | |
5 | inet_ntop (AF_INET, &(ip_hdr -> ip_src), src_ip, INET_ADDRSTRLEN); |
6 | |
7 | if (ip_hdr -> ip_p == IPPROTO_UDP) {// Check for UDP packets |
8 | const struct someip_packet ∗ someip_pkt = (struct someip_packet ∗)(packet + 14 + ip_hdr -> ip_hl ∗ 4); |
9 | int rule_index = check_ecu_rule (src_ip, someip_pkt); |
10 | |
11 | if (rule_index >= 0) { |
12 | printf (" Valid ␣ packet ␣ matched ␣ with ␣ECU%d␣ rules \n", rule_index + 1); |
13 | } else { |
14 | printf (" Unmatched ␣ packet ␣ from ␣%s!␣ Possible ␣ attack ␣ detected .\n", src_ip); |
15 | } |
16 | } |
17 | } |
4.4. Experimental Setup
- ECU Components (ECU1, ECU2, ECU3, ECU4, and ECU5): These scripts simulate legitimate ECUs within the vehicle’s network, transmitting standard, authorized packets. ECU1 and ECU2 generate and send routine communication packets across the network to emulate regular vehicular functions.
- Intrusion Detection System (IDS): This IDS script monitors the network for suspicious packets or anomalies. With CHERI capabilities enabled, the IDS memory is compartmentalized, ensuring that only authorized processes can access or modify its rule set. The IDS is configured to detect IP spoofing attempts and log unauthorized access to the IDS memory or rule configurations. Separate memory locations are defined on the IDS for each ECU’s rules, meaning that each ECU has its own set of rules stored in an isolated memory location.
- Attacker Model (Attacker): The attacker model is designed to send spoofed IP packets, using legitimate IP addresses to disguise malicious activities. The attacker’s objective is to bypass the IDS by impersonating a legitimate ECU. If successful, the attacker aims to modify IDS rules to prevent future detections and alter the rules to allow malicious data to be sent to critical ECUs.
- Packet Sniffer (Sniff): This component captures network traffic for analysis and logs all packets, enabling verification of whether spoofed packets are correctly identified by the IDS.
4.5. Execution of Attack
4.6. CHERI-Enhanced Memory Protections
- Access Permissions: Only authorized memory regions can be accessed by the IDS. Unauthorized attempts to modify IDS rules or configurations trigger CHERI alerts.
- Memory Bounds: The memory boundaries around IDS rules are strictly enforced, preventing any modification or access from processes outside of predefined bounds.
- Logging Violations: Each unauthorized memory access attempt is logged, providing detailed records of any access violations. This functionality allows for verification of CHERI’s effectiveness in blocking unauthorized access to IDS configurations.
5. Results and Analysis
5.1. IDS Rule Integrity and Unauthorized Access Blocking
- Memory Access Violation Logs: The CHERI-enabled IDS logged multiple unauthorized access attempts by the attacker as they tried to modify the IDS rules. Each access violation was flagged by CHERI’s capability checks, which block any process outside the authorized scope from modifying memory. This illustrates CHERI’s effectiveness in maintaining the integrity of the IDS rule set, as all modification attempts were successfully prevented as shown in Figure 4.
- Rule Integrity Preservation: The IDS maintained its rule configurations intact throughout the attack scenario, as evidenced by the lack of any successful modifications to the IDS rules. CHERI’s memory protection mechanisms effectively isolated the IDS configuration, preventing the attacker from altering detection logic. This result demonstrates the value of CHERI capabilities in protecting critical security configurations, ensuring consistent IDS performance even under attack.
5.2. Analysis of CHERI’s Impact on IDS Security
- Increased Resilience to Spoofing Attacks: CHERI’s hardware-enforced memory compartmentalization makes the IDS resilient to IP-based spoofing attacks. Although the attacker could mimic legitimate IPs, CHERI’s memory protection mechanisms prevented unauthorized influence on the IDS logic.
- Enhanced Rule Protection Against Manipulation Attempts: The compartmentalized memory model prevented the attacker from modifying IDS rules, effectively securing the IDS from rule manipulation attacks. The unauthorized access logs demonstrate that CHERI successfully restricted all access attempts to the IDS configuration, ensuring rule integrity.
- Implications for Real-Time Security Applications: The minimal performance overhead observed in this experiment suggests that CHERI is suitable for real-time security applications in automotive contexts, where high-speed detection and low latency are critical.
- Hardware-Enforced Memory Isolation: CHERI’s capability-based architecture ensures that IDS rules and configurations are stored in strictly isolated memory regions. This isolation prevents unauthorized access, even if attackers employ advanced methods like spoofing or real-time packet alterations. CHERI’s memory bounds enforce deterministic hardware traps when unauthorized attempts are made to access or modify IDS rule sets.
- Dynamic Anomaly Detection: The IDS processes incoming SOME/IP packets in real time, validating attributes like source IP, payload structure, and session identifiers against CHERI-protected rule sets. CHERI ensures that, even if attackers manipulate live network traffic to mimic legitimate patterns, any deviation from the CHERI-enforced rules triggers alerts, ensuring the integrity of the detection mechanism.
- Real-Time Logging and Response: CHERI capabilities enable the real-time logging of unauthorized memory access attempts. These logs allow the IDS to adapt dynamically by flagging patterns of sophisticated manipulation, such as timing inconsistencies or malformed packets, enhancing its ability to counter evolving attack vectors.
5.3. Simulated Scenarios and Scalability Analysis
- Telemetry ECU: Transmitted data packets at a rate of 12.5 packets per second.
- Control Signal ECU: Maintained a rate of 10 packets per second for command updates.
- Sensor Data ECU: Generated sensor readings at 25 packets per second.
- Detection Accuracy: Consistently achieved 100% detection of spoofed packets across all scenarios.
- Latency: Average response time remained at 12 ms, only a marginal increase compared to the baseline IDS without CHERI, which exhibited a latency of 10 ms.
- Latency Considerations: Our study observed an average latency increase of 2 ms (from 10 ms to 12 ms) compared to a baseline IDS without CHERI. This marginal overhead, caused by the additional memory bound checks enforced by CHERI, remains well within the acceptable limits for real-time automotive systems. For instance, in automatic braking systems, where the latency threshold is typically below 50 ms, the additional 2 ms does not compromise responsiveness. This ensures that the enhanced security provided by CHERI does not hinder the performance of critical safety mechanisms. Future work will aim to optimize CHERI’s integration into more resource-constrained environments, further minimizing latency to meet the stringent requirements of ultra-fast vehicular control systems.
- Memory Overheads: The fine-grained memory protection mechanisms of CHERI require additional memory for storing metadata (capabilities). While this increases memory consumption, the impact was minimized by the efficient memory management features of the ARM Morello board. This trade-off is justified by the significant security benefits gained, including robust protection against memory corruption and unauthorized access.
- Scalability in High-Throughput Scenarios: During simulations with increased ECU counts and packet volumes, the CHERI-enhanced IDS maintained consistent performance. Even under high packet rates, the system demonstrated 100% detection accuracy with negligible degradation in processing times, proving its scalability for large-scale automotive networks.
- Real-Time Packet Processing: CHERI’s capability-based protections allow the IDS to process SOME/IP packets dynamically, ensuring strict adherence to rule configurations. This ensures that security is maintained without significant delays, which is vital for time-sensitive operations like braking and collision avoidance.
- Hardware Costs and Automotive Integration: While adopting CHERI requires CHERI-enabled hardware, such as the ARM Morello board, these costs are offset by the long-term benefits of hardware-enforced security. However, it is important to note that current experiments are conducted on research-grade hardware, and further work is needed to deploy CHERI capabilities on automotive-grade devices, such as the SONATA board or equivalent platforms. This step will ensure real-world feasibility, compliance with industry standards, and suitability for production environments in the automotive sector.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AUTOSAR | Automotive Open System Architecture |
CAN | Controller Area Network |
CAN-FD | Controller Area Network with Flexible Data Rate |
CEP | Complex Event Processing |
CHERI | Capability Hardware Enhanced RISC Instructions |
DDoS | Distributed Denial of Service |
DPI | Deep Packet Inspection |
ECU | Electronic Control Unit |
IDS | Intrusion Detection System |
ISO | International Organization for Standardization |
MITM | Man-in-the-Middle |
OTA | Over-the-Air |
PCAP | Packet Capture |
SOME/IP | Scalable service-Oriented Middleware over IP |
TESLA | Timed Efficient Stream Loss-tolerant Authentication |
References
- Luo, F.; Zhang, X.; Hou, S. Research on cybersecurity testing for in-vehicle network. In Proceedings of the 2021 International Conference on Intelligent Technology and Embedded Systems (ICITES), Chengdu, China, 31 October–2 November 2021; pp. 144–150. [Google Scholar]
- Abdelkader, G.; Elgazzar, K.; Khamis, A. Connected vehicles: Technology review, state of the art, challenges and opportunities. Sensors 2021, 21, 7712. [Google Scholar] [CrossRef] [PubMed]
- Kabilan, N.; Ravi, V.; Sowmya, V. Unsupervised intrusion detection system for in-vehicle communication networks. J. Saf. Sci. Resil. 2024, 5, 119–129. [Google Scholar]
- Almehdhar, M.; Albaseer, A.; Khan, M.A.; Abdallah, M.; Menouar, H.; Al-Kuwari, S.; Al-Fuqaha, A. Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks. IEEE Open J. Veh. Technol. 2024, 5, 869–906. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Al-Jarrah, O.Y.; Maple, C.; Dianati, M.; Oxtoby, D.; Mouzakitis, A. Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 2019, 7, 21266–21289. [Google Scholar] [CrossRef]
- Zuech, R.; Khoshgoftaar, T.M.; Wald, R. Intrusion detection and big heterogeneous data: A survey. J. Big Data 2015, 2, 3. [Google Scholar] [CrossRef]
- Hamada, Y.; Inoue, M.; Adachi, N.; Ueda, H.; Miyashita, Y.; Hata, Y. Intrusion detection system for in-vehicle networks. SEI Tech. Rev. 2019, 88, 76–81. [Google Scholar]
- Samaila, M.G.; Neto, M.; Fernandes, D.A.B.; Freire, M.M.; Inácio, P.R.M. Challenges of Securing Internet of Things Devices: A Survey. Secur. Priv. 2018, 1, e20. [Google Scholar] [CrossRef]
- Greenberg, A. Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug; Wired: London, UK, 2021. [Google Scholar]
- Connected Cars: On The Edge of a Breakthrough. Available online: https://aecc.org/resources/publications/ (accessed on 2 December 2024).
- Woodruff, J.D. CHERI: A RISC Capability Machine for Practical Memory Safety; Technical Report UCAM-CL-TR-858; University of Cambridge, Computer Laboratory: Cambridge, UK, 2014. [Google Scholar]
- University of Cambridge. The CHERI Project. Available online: https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/ (accessed on 2 December 2024).
- Davis, B.; Watson, R.N.; Richardson, A.; Neumann, P.G.; Moore, S.W.; Baldwin, J.; Chisnall, D.; Clarke, J.; Filardo, N.W.; Gudka, K.; et al. CheriABI: Enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment. In Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, Providence, RI, USA, 13–17 April 2019; pp. 379–393. [Google Scholar]
- Embedded.com. Why C/C++ Dominate in Automotive Systems. Available online: https://www.embedded.com/ (accessed on 2 December 2024).
- ARM. Introducing the Morello Prototype Board. Available online: https://www.arm.com/morello (accessed on 2 December 2024).
- ISO/SAE 21434; Road Vehicles—Cybersecurity Engineering. International Standards Organization: Geneva, Switzerland, 2020. Available online: https://www.iso.org/standard/70918.html (accessed on 2 December 2024).
- Ibrahim, M.E.; Abbas, Q.; Daadaa, Y.; Ahmed, A.E. A Novel PPG-Based Biometric Authentication System Using a Hybrid CVT-ConvMixer Architecture with Dense and Self-Attention Layers. Sensors 2024, 24, 15. [Google Scholar] [CrossRef] [PubMed]
- Saltzer, J.H. Protection and the control of information sharing in Multics. Commun. ACM 1974, 17, 388–402. [Google Scholar] [CrossRef]
- Woodruff, J.; Watson, R.N.M.; Chisnall, D.; Moore, S.W.; Anderson, J.; Davis, B.; Laurie, B.; Neumann, P.G.; Norton, R.; Roe, M. The CHERI Capability Model: Revisiting RISC in an Age of Risk. In Proceedings of the 41st Annual International Symposium on Computer Architecture (ISCA), Minneapolis, MN, USA, 14–18 June 2014; pp. 457–468. [Google Scholar] [CrossRef]
- Kho, N.M.D.; Uy, R.L. MIPSers: MIPS extension release 6 simulator. In Proceedings of the 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Manila, Philippines, 1–3 December 2017; pp. 1–6. [Google Scholar]
- Grisenthwaite, R.; Barnes, G.; Watson, R.N.; Moore, S.W.; Sewell, P.; Woodruff, J. The Arm Morello Evaluation Platform—Validating CHERI-based Security in a High-performance System. IEEE Micro 2023, 43, 50–57. Available online: https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/202305ieeemicro-morello-platform.pdf (accessed on 2 December 2024). [CrossRef]
- Aliwa, E.; Rana, O.; Perera, C.; Burnap, P. Cyberattacks and countermeasures for in-vehicle networks. ACM Comput. Surv. (CSUR) 2021, 54, 21. [Google Scholar] [CrossRef]
- Hafeez, A.; Topolovec, K.; Awad, S. ECU fingerprinting through parametric signal modeling and artificial neural networks for in-vehicle security against spoofing attacks. In Proceedings of the 2019 15th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 29–30 December 2019; pp. 29–38. [Google Scholar]
- Song, S.; Manikopoulos, C.N. IP Spoofing Detection Approach (ISDA) for Network Intrusion Detection System. In Proceedings of the 2006 IEEE Sarnoff Symposium, Princeton, NJ, USA, 27–28 March 2006; pp. 1–4. [Google Scholar] [CrossRef]
- Parameshwarappa, P.; Chen, Z.; Gangopadhyay, A. Analyzing attack strategies against rule-based intrusion detection systems. In Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, Varanasi, India, 4–7 January 2018; pp. 1–4. [Google Scholar]
- Zorman, E.H.; Isoaho, J.; Mohammad, T. Implementation of a SOME/IP Firewall with Deep Packet Inspection for Automotive Use-Cases. Ph.D. Thesis, University of Turku, Turku, Finland, 2024. [Google Scholar]
- Ghadi, M.; Sali, Á.; Szalay, Z.; Török, Á. A new methodology for analyzing vehicle network topologies for critical hacking. J. Ambient Intell. Humaniz. Comput. 2021, 12, 7923–7934. [Google Scholar] [CrossRef]
- AUTOSAR. Specification of Module Secure Onboard Communication—CP; Technical Report, Release 4.2.2; AUTOSAR: Hörgertshausen, Germany, 2017. [Google Scholar]
- Lee, T.Y.; Lin, I.A.; Liao, R.H. Design of a FlexRay/Ethernet gateway and security mechanism for in-vehicle networks. Sensors 2020, 20, 641. [Google Scholar] [CrossRef]
- Islam, R.; Refat, R.U.D. Improving CAN bus security by assigning dynamic arbitration IDs. J. Transp. Secur. 2020, 13, 19–31. [Google Scholar] [CrossRef]
- Hafeez, A.; Malik, H.; Irtaza, A.; Uddin, M.Z.; Noori, F.M. Enhancing ECU identification security in CAN networks using distortion modeling and neural networks. Front. Comput. Sci. 2024, 6, 1392119. [Google Scholar] [CrossRef]
- Woo, S.; Jo, H.J.; Kim, I.S.; Lee, D.H. A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2248–2261. [Google Scholar] [CrossRef]
- Lodge, N.; Tambe, N.; Saqib, F. Addressing Vulnerabilities in CAN-FD: An Exploration and Security Enhancement Approach. IoT 2024, 5, 290–310. [Google Scholar] [CrossRef]
- Kreissl, J. Absicherung der Some/IP Kommunikation bei Adaptive Autosar. Master’s Thesis, Universität Stuttgart, Stuttgart, Germany, 2017. [Google Scholar]
- Iorio, M.; Reineri, M.; Risso, F.; Sisto, R.; Valenza, F. Securing SOME/IP for in-vehicle service protection. IEEE Trans. Veh. Technol. 2020, 69, 13450–13466. [Google Scholar] [CrossRef]
- Herold, N.; Posselt, S.A.; Hanka, O.; Carle, G. Anomaly detection for SOME/IP using complex event processing. In Proceedings of the NOMS 2016—2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 25–29 April 2016; pp. 1221–1226. [Google Scholar]
- Liu, Q.; Li, X.; Sun, K.; Li, Y.; Liu, Y. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic. IEEE Internet Things J. 2024, 11, 27322–27339. [Google Scholar] [CrossRef]
- McKeen, F.; Alexandrovich, I.; Berenzon, A.; Rozas, C.; Shafi, H.; Shanbhogue, V.; Savagaonkar, U. Innovative instructions and software model for isolated execution. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, 23–24 June 2013; pp. 1–8. [Google Scholar]
- ARM. Building a Secure System Using TrustZone Technology. 2019. Available online: https://developer.arm.com/documentation (accessed on 2 December 2024).
- Kumar, A.; Gholve, A.; Kotalwar, K. Automotive Security Solution Using Hardware Security Module (HSM); Technical Report, SAE Technical Paper; SAE International: Warrendale PA, USA, 2024. [Google Scholar]
- Saltzer, J.H.; Schroeder, M.D. The protection of information in computer systems. Proc. IEEE 1975, 63, 1278–1308. [Google Scholar] [CrossRef]
ECU Type | Packet Rate (Packets/s) | Number of ECUs | Duration (s) | Total Packets Sent |
---|---|---|---|---|
Telemetry ECU | 12.5 | 1 | 1800 | 22,500 |
Control Signal ECU | 30 | 2 | 1800 | 108,000 |
Sensor Data ECU | 75 | 2 | 1800 | 270,000 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kalutharage, C.S.; Mohan, S.; Liu, X.; Chrysoulas, C. Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection. Electronics 2025, 14, 474. https://doi.org/10.3390/electronics14030474
Kalutharage CS, Mohan S, Liu X, Chrysoulas C. Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection. Electronics. 2025; 14(3):474. https://doi.org/10.3390/electronics14030474
Chicago/Turabian StyleKalutharage, Chathuranga Sampath, Saket Mohan, Xiaodong Liu, and Christos Chrysoulas. 2025. "Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection" Electronics 14, no. 3: 474. https://doi.org/10.3390/electronics14030474
APA StyleKalutharage, C. S., Mohan, S., Liu, X., & Chrysoulas, C. (2025). Enhancing Automotive Intrusion Detection Systems with Capability Hardware Enhanced RISC Instructions-Based Memory Protection. Electronics, 14(3), 474. https://doi.org/10.3390/electronics14030474