SlideShare a Scribd company logo
1 of 63
Download to read offline
Jun Li
Twitter:@bravo_fighter
UnicornTeam
Qihoo360
Automobile Intrusion Detection
2
What this talk is
about?
Automotive intrusion detection
Automotive cyber-security architecture
3
From the highest viewpointJ
Outline
•  Quick recap of the status quo of
car security research
•  Little automobile working principle
•  CAN bus anomaly detection
Performance
Tuning by
modifying
firmware
Immobilizer
Cracking
(Hitag,
Keeloq)
DARPA&UW
OBD
interface
attack,etc.
Karl et al.
Remote
attack
via wireless
OBD
interface
Telsa
Qihoo360
BMW
ConnectedDrive
vuln
Mbrace Jeep Uconnect
Charlie&Chris
GM Onstar
Vuln,Sammy
More to
come ?
Sure!
Car hacking
development
Car explained
Sensor security
In automotive electronics, Electronic
Control Unit (ECU) is a generic term for
any secret system that controls one or
more of the electrical system or
subsystems in a transport vehicle
Types of ECU include Electronic/engine
Control Module (ECM), Powertrain Control
Module (PCM), Transmission Control
Module (TCM), Brake Control Module
(BCM or EBCM), Central Control Module
(CCM), Central Timing Module (CTM),
General Electronic Module (GEM),
Body Control Module (BCM), Suspension
Control Module (SCM), control unit, or
control module
ECU (Electronic Control Unit)
Electronic Control Module Example
9
Automotive Mechatronics
10
Non-hackable hackable
11
Throttle position sensor
Drive-by-wire system
12
Steering-by-wire system
Universal joint
Steer-by –wire
(with mechanical fallback clutch)
Automotive Control System Architecture
Vehicle CAN BUS System
Vehicle Communication System
OBDII
MOST
LIN
CAN
FlexRay
Bluetooth
Wifi
SubGHz
Infotainment
System
ESP TCU ACC
ESP(electronic stability program
TCU(transmission control unit)
ACC(adaptive cruise
control)
… CAN-C
网
Speedometer
CAN-B
Infotainment
System
Music Player
INS(Inertial navigation system
INS
EMU
EMU(engine management
system)
Seat Controller
Vehicle Communication System example
CAN BUS Signaling
CAN Frame Structure
0 dominant
1 recessive
1 1 1
1
01
1
1
1 0
0
0
1
1
1 0 0
0 0
0 0
CAN Bus Access Arbitration
Packets injection
Parameter spoofing
CAN BUS Attack
Jeep Uconnect Vulnerability
WiFifemotocellSprintInternet CAN
Remote Attack Example
Automotive intrusion detection researches
Automotive intrusion detection researches
Not considering
Temporal feature
Distributed
architecture
CAN总线安全防御模型
IDS
IDS(Intrusion Detection System)
① Real time requirements
② Hard to trace back to sender
③ High cost of false positive
④ …
Difficulties of CAN bus
defence
CAN Anomaly Detection McAfee&Intel
CAN bus defence
IDS
CAN security architecture
Bluetooth WiFi Cellular V2X
IDS
Experiment Car
•  Cellular Connection
•  Cloud Service
•  Bluetooth Key
•  Hybrid
•  Electronic Brake
•  Electric Power
Steering
•  Electronic Throttle
Experiment car’s CAN network
The CAN database
Why don’t we build a model
Take the relation ship of rpm and speed ,
gear for example,we can create a
model of the System‘s behavior
汽车工作原理
Anomaly detection system
Realtime data
stream
Cross
Prediction
Parameter
extraction
System model requirements
Gear
Build the system model
Data
Collection
Data
preprocess
Data
analysis
Feature
Selection
Model
Training
&Testing
Data
Acquisition Parameter presence on different BUS
Parameter	 Speed	
Engine	
RPM	
Acceleration	
Pedal	
Intake	
Pressure	
Brake	
Pedal	
Steering	
Wheel	
Gear	
BUS	
Instrument	 o	 o	 x	 x	 o	 o	 o	
Comfort	 o	 o	 x	 x	 o	 x	 x	
Power	 o	 o	 o	 o	 o	 x	 x	
ECM	 o	 o	 o	 o	 o	 x	 o	
ESC	 o	 o	 o	 x	 o	 o	 o
Data Acquisition Setup
Data Analysis Can database is kept highly confidential
Data Preprocess
Data Preprocess
Interpolation
Sampling
Normalization
Normalization
Must make sure the maximum and minimum value,don’t
calculate from the training data
数据插值
Observation
Interpolation
Sub-Sampling
Sub-SamplingTime_
ms
RPM Speed MAP MAF AccPeda
l Throttle
13897
3
0.287983
8
0.134259
2
0.059055
1
0.167567
5
0.697107
0
0.137795
2
13897
4
0.287312
5
0.134259
2
0.055118
1
0.167567
5
0.697107
0
0.137795
2
13897
5
0.287312
5
0.134259
2
0.051181
1
0.167567
5
0.697107
0
0.137795
2
13897
6
0.285970 0.134259
2
0.047244
0
0.167567
5
0.697107
0
0.137795
2
13897
7
0.285970 0.134259 0.051181
1
0.167567
5
0.697107
0
0.137795
2
Sub-Sampling
Model training
Model training
Results
Result
Model testing
Model testing
Acknowledgement
Professor Shuicheng Yan
Doctor Ming Lin
Doctor Zhanyi Wang
Doctor Lin Huang
Thank You!
Q&A
Reference
1.  Karl Koscher, Alexei Czeskis, Experimental Security Analysis of a Modern
Automobile, 2010
2.  Stephen Checkoway,Damon McCoy,Brian Kantor, Comprehensive Experimental
Analyses of Automotive Attack Surfaces,2011.
3.  Charlie Miller,Chris Valasek,Adventures in Automotive Networks and Control
Units,2013.
4.  Charlie Miller,Chris Valasek,Remote Exploitation of an Unaltered Passenger
Vehicle,2015
5.  Dieter Spaar,Sicherheitslücken bei BMWs ConnectedDrive/ Beemer, Open
Thyself! – Security vulnerabilities in BMW's ConnectedDrive,2015.
6.  Iamthecarvalry.org , Five Star Automotive Cyber Safety Framework,2015.
7.  Pierre Kleberger,Security Aspects of the In-Vehicle Network in the Connected
Car,IEEE Intelligent Vehicles Symposium,2011
8.  Marc Rogers,Kevin Mahaffey,How to Hack a Tesla Model S,DEF CON
23,2015
9.  Charlie Miller Chris Valasek,Advanced CAN Injection Techniques for Vehicle
Networks,BlackhatUSA,2016
10. Kyong-Tak Cho and Kang G. Shin, Fingerprinting Electronic Control Units for
Vehicle Intrusion Detection, 2016
11. Nobuyasu Kanekawa,X-by-Wire Systems,Hitachi Research Lab.2011
12. Paul Yih, Steer-by-Wire: Implication For Vehicle Handling and Safety,Stanford
PHD Dissertation,2005
13. Luigi Coppolion,Dependability aspects of automotive x-by-wire technologies,
2008.
14. Jonas Zaddach,Andrei Costin,Embedded Devices Security and Firmware Reverse
Engineering,Blackhat Workshop,2013.
15. Andrei costin,Jonas Zaddach,A large-Scale Analysis of the Security of
Embedded Firmwares,EURECOM,2014.
16. Samy Kamkar,Drive It Like You hacked It,DEF CON23,2015
17. David A Brown, Geoffrey Cooper, Automotive Security Best Practices, White
Paper by Intel & McAfee,2014.
18. OpenGarages, Car Hacker’s Handbook,openGarage.org,2014.
19. Henning Olsson, OptimumG,Vehicle Data Acquisition Using CAN,2010
20. Varun Chandola,Arindam Banerjee,Vipin Kumar,Anomaly Detection :A
Survey,2009
21. Park, Ming Kuang, Neural learning of driving environment prediction for vehicle
power management, Joint Conf. on Neural Networks, 2008.
22. Taylor, P., Adamu-Fika, F., Anand, S., Dunoyer, A., Griffiths, N., and Popham, T.
Road type classification through data mining,2012.
23. Michael Muter, Naim Asaj,Entropy-based anomaly detection for in-vehicle
networks", IEEE Intelligent Vehicles Symposium (IV), 2011.
24. Ulf E. Larson, Dennis K. Nilsson,An Approach to Specification-based Attack
Detection for In-Vehicle Networks, IEEE Intelligent Vehicles Symposium,2008.
25. Y. L. Murphey, Zhi Hang Chen, L. Kiliaris, Jungme ,I. Tang and T. P. Breckon,
Automatic road environment classication, IEEE Trans. on Intelligent
Transportation Systems, 2011.
26. Salima Omar, Asri Ngadi, Hamid H.Jebur, Machine Learning Techniques for
Anomaly Detection: An Overview.
27. Perter Harrington,Machine Learning In Action,2013.
28. Jurgen Schmidhuber, Deep learning in neural networks: An overview, 2015.
29. Kaiserslautern,Comparison of Unsupervised Anomaly Detection Techniques,
German Research Center for Artificial Intelligence, 2011
30. Sepp Hochreiter, Jurgen Schmidhuber, Long short-term memory,Neural
computation, 1997.
31. Michael Husken, Peter Stagge,Recurrent neural networks for time series
classifcation, Neurocomputing, 2003.
32. Felix A Gers, Jurgen Schmidhuber, Fred Cummins, Learning to forget:Continual
prediction with LSTM, Neural computation, 2000.
33. David E Rumelhart, Geo_rey E Hinton, and Ronald J Williams.,Learning
internal representations by error propagation,1985.
34. Christopher M Bishop,Pattern recognition and machine learning, springer, 2006.
35. Simon Haykin and Neural Network. A comprehensive foundation. Neural
Networks, 2004.
36. Eleazar Eskin,Andrew Arnold,Michael Prerau, A Geometric Framework for
Unsupervised Anomaly Detection-Detecting Intrusions in Unlabeled Data
tection-Detecting Intrusions in Unlabeled Data,2002.
37. Kingsly Leung, Christopher Leckie, Unsupervised Anomaly Detection in
Network Intrusion Detection Using Clusters, 2005

More Related Content

Viewers also liked

CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCanSecWest
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCanSecWest
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCanSecWest
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCanSecWest
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCanSecWest
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCanSecWest
 
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CanSecWest
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_markCSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_markCanSecWest
 
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CanSecWest
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CanSecWest
 
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CanSecWest
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CanSecWest
 
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCanSecWest
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCanSecWest
 
Csw2016 chen grassi-he-apple_graphics_is_compromised
Csw2016 chen grassi-he-apple_graphics_is_compromisedCsw2016 chen grassi-he-apple_graphics_is_compromised
Csw2016 chen grassi-he-apple_graphics_is_compromisedCanSecWest
 
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CanSecWest
 
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershellCSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershellCanSecWest
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CanSecWest
 

Viewers also liked (20)

CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 final
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_markCSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
 
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
 
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Scott kelly secureboot-csw2017-v1
 
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Qidan he+Gengming liu_cansecwest2017
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
 
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platformsCSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
 
Csw2016 chen grassi-he-apple_graphics_is_compromised
Csw2016 chen grassi-he-apple_graphics_is_compromisedCsw2016 chen grassi-he-apple_graphics_is_compromised
Csw2016 chen grassi-he-apple_graphics_is_compromised
 
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
 
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershellCSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
 

Similar to CSW2017 jun li_car anomaly detection

Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systemsanand hd
 
Traffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxTraffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxharimaxwell0712
 
Intel Vision for-autonomous-driving
Intel Vision for-autonomous-drivingIntel Vision for-autonomous-driving
Intel Vision for-autonomous-drivingDESMOND YUEN
 
Intelligent transport system himanshi
Intelligent transport system   himanshiIntelligent transport system   himanshi
Intelligent transport system himanshiPreeti Rashmi
 
Driver assistance system
Driver assistance systemDriver assistance system
Driver assistance systemrahulnale175
 
Design and Implementation of Car Black box for Evidence Collection System to ...
Design and Implementation of Car Black box for Evidence Collection System to ...Design and Implementation of Car Black box for Evidence Collection System to ...
Design and Implementation of Car Black box for Evidence Collection System to ...IJMTST Journal
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving SystemIRJET Journal
 
Vinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsVinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsvinumukkati
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
An Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars
An Ontology-Based Intelligent Speed Adaptation System for Autonomous CarsAn Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars
An Ontology-Based Intelligent Speed Adaptation System for Autonomous CarsLihua Zhao
 
Smart Driving Labs connected cars
Smart Driving Labs connected carsSmart Driving Labs connected cars
Smart Driving Labs connected carsMauroBenigno4
 
INTELLIGENT TRANSPORT SYSTEM (ITS)
INTELLIGENT TRANSPORT SYSTEM (ITS)INTELLIGENT TRANSPORT SYSTEM (ITS)
INTELLIGENT TRANSPORT SYSTEM (ITS)Chaitanya Sasetti
 
Ontologies for Advanced Driver Assistance Systems
Ontologies for Advanced Driver Assistance SystemsOntologies for Advanced Driver Assistance Systems
Ontologies for Advanced Driver Assistance SystemsLihua Zhao
 
Number Plate Recognition System
Number Plate Recognition System Number Plate Recognition System
Number Plate Recognition System Aditya Mishra
 
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck Crashes
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck CrashesShiny-side Up: Advanced Technologies That Can Reduce Heavy Truck Crashes
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck CrashesTexas A&M Transportation Institute
 
Smart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingSmart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingST_World
 
intelligent transport system bgsbu coet
intelligent transport system bgsbu coetintelligent transport system bgsbu coet
intelligent transport system bgsbu coetjunaid bashir
 
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...Sheethal Rajagopal
 

Similar to CSW2017 jun li_car anomaly detection (20)

Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systems
 
Traffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptxTraffic Signboard Classification with Voice alert to the driver.pptx
Traffic Signboard Classification with Voice alert to the driver.pptx
 
Intel Vision for-autonomous-driving
Intel Vision for-autonomous-drivingIntel Vision for-autonomous-driving
Intel Vision for-autonomous-driving
 
Intelligent transport system himanshi
Intelligent transport system   himanshiIntelligent transport system   himanshi
Intelligent transport system himanshi
 
Driver assistance system
Driver assistance systemDriver assistance system
Driver assistance system
 
Design and Implementation of Car Black box for Evidence Collection System to ...
Design and Implementation of Car Black box for Evidence Collection System to ...Design and Implementation of Car Black box for Evidence Collection System to ...
Design and Implementation of Car Black box for Evidence Collection System to ...
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
Vinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsVinod_Autonomous_car_ppts
Vinod_Autonomous_car_ppts
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
An Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars
An Ontology-Based Intelligent Speed Adaptation System for Autonomous CarsAn Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars
An Ontology-Based Intelligent Speed Adaptation System for Autonomous Cars
 
Smart Driving Labs connected cars
Smart Driving Labs connected carsSmart Driving Labs connected cars
Smart Driving Labs connected cars
 
INTELLIGENT TRANSPORT SYSTEM (ITS)
INTELLIGENT TRANSPORT SYSTEM (ITS)INTELLIGENT TRANSPORT SYSTEM (ITS)
INTELLIGENT TRANSPORT SYSTEM (ITS)
 
Ontologies for Advanced Driver Assistance Systems
Ontologies for Advanced Driver Assistance SystemsOntologies for Advanced Driver Assistance Systems
Ontologies for Advanced Driver Assistance Systems
 
Number Plate Recognition System
Number Plate Recognition System Number Plate Recognition System
Number Plate Recognition System
 
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck Crashes
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck CrashesShiny-side Up: Advanced Technologies That Can Reduce Heavy Truck Crashes
Shiny-side Up: Advanced Technologies That Can Reduce Heavy Truck Crashes
 
Smart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated DrivingSmart Enabling Technologies for Automated Driving
Smart Enabling Technologies for Automated Driving
 
Adaptive cruise control’
Adaptive cruise control’Adaptive cruise control’
Adaptive cruise control’
 
intelligent transport system bgsbu coet
intelligent transport system bgsbu coetintelligent transport system bgsbu coet
intelligent transport system bgsbu coet
 
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...
ECall-Compliant Early Crash Notification Service for Portable and Nomadic Dev...
 
Ecall :
Ecall : Ecall :
Ecall :
 

More from CanSecWest

Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCanSecWest
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCanSecWest
 
Csw2016 song li-smart_wars
Csw2016 song li-smart_warsCsw2016 song li-smart_wars
Csw2016 song li-smart_warsCanSecWest
 
Csw2016 tang virtualization_device emulator testing technology
Csw2016 tang virtualization_device emulator testing technologyCsw2016 tang virtualization_device emulator testing technology
Csw2016 tang virtualization_device emulator testing technologyCanSecWest
 
Csw2016 macaulay eh_trace-rop_hooks
Csw2016 macaulay eh_trace-rop_hooksCsw2016 macaulay eh_trace-rop_hooks
Csw2016 macaulay eh_trace-rop_hooksCanSecWest
 
Csw2016 d antoine_automatic_exploitgeneration
Csw2016 d antoine_automatic_exploitgenerationCsw2016 d antoine_automatic_exploitgeneration
Csw2016 d antoine_automatic_exploitgenerationCanSecWest
 
Csw2016 gawlik bypassing_differentdefenseschemes
Csw2016 gawlik bypassing_differentdefenseschemesCsw2016 gawlik bypassing_differentdefenseschemes
Csw2016 gawlik bypassing_differentdefenseschemesCanSecWest
 
Csw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnologyCsw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnologyCanSecWest
 
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerabilityCsw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerabilityCanSecWest
 
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacketCsw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacketCanSecWest
 

More from CanSecWest (10)

Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Csw2016 song li-smart_wars
Csw2016 song li-smart_warsCsw2016 song li-smart_wars
Csw2016 song li-smart_wars
 
Csw2016 tang virtualization_device emulator testing technology
Csw2016 tang virtualization_device emulator testing technologyCsw2016 tang virtualization_device emulator testing technology
Csw2016 tang virtualization_device emulator testing technology
 
Csw2016 macaulay eh_trace-rop_hooks
Csw2016 macaulay eh_trace-rop_hooksCsw2016 macaulay eh_trace-rop_hooks
Csw2016 macaulay eh_trace-rop_hooks
 
Csw2016 d antoine_automatic_exploitgeneration
Csw2016 d antoine_automatic_exploitgenerationCsw2016 d antoine_automatic_exploitgeneration
Csw2016 d antoine_automatic_exploitgeneration
 
Csw2016 gawlik bypassing_differentdefenseschemes
Csw2016 gawlik bypassing_differentdefenseschemesCsw2016 gawlik bypassing_differentdefenseschemes
Csw2016 gawlik bypassing_differentdefenseschemes
 
Csw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnologyCsw2016 wang docker_escapetechnology
Csw2016 wang docker_escapetechnology
 
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerabilityCsw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
Csw2016 gong pwn_a_nexus_device_with_a_single_vulnerability
 
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacketCsw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

CSW2017 jun li_car anomaly detection