Automotive Cyber Security

Car dashboard and steering wheel with a laptop next to them displaying data captured from the car.

The rise in connected autonomous vehicles presents challenges such as software reliability, operational trust and determination of accountability. A major concern is cyber security. Vehicle-attack opportunities are still emerging and not yet fully understood.

 

1) Assessing the threat and perceptions of automotive cyber risk. Vehicles will increasingly need to communicate with one another and to cloud systems. With the rise in connectivity, come the increasing risk of cyber breaches. Attacks could potentially affect data privacy, vehicle security or even vehicle safety. But how great is the danger? What are the perceptions of the car users? And how should we measure these? These are questions that automotive manufactures will need to increasingly ask in the next few years. 

 

2) Devising and testing automotive cyber attack scenarios. The Controller Area Network (CAN) is a crucial in-vehicle network used by safety crucial components, such as transmission, engine performance and braking. It is possible to read packets from the car’s CAN (as well as inject malicious packets), though the car manufacturers keep the meaning of the data secret.

Projects could investigate what CAN data sets might be available for testing attack detection, or investigate how attacks might be simulated, or devise algorithms to detect suspicious anomalies in data which might indicate an attack. One option would be to use a laptop based based CAN simulator (such as the free Kvaser CAN King) and CAN Python libraries with pre-gathered CAN logs (which we already collected). 

Detecting Physical Misuse of Mobile Devices

damaged phone

Due to the ubiquitous and pervasive nature of mobile devices they are prone to being exposed to a wide variety of potentially hazardous environments and situations. There is a growing interest in being able to monitor and detect exposure to such environments. An example of this is the inclusion of water ingress detectors in many mobile devices that change colour when exposed to water. 

This project aims to extend the kinds of hazards that can be detected by mobile devices. In particular it should look at impact forces and generate notifications of potentially harmful forces. The project would consist of development and evaluation of potential detection techniques using existing sensors and to develop a working prototype logging and notification application.

Exploiting QR codes using an Evolutionary Algorithm

QR code

This project will investigate the feasibility of using Evolutionary Computation to generate QR codes which contain aesthetically appealing patterns or shapes. 

QR codes typically appear to contain a random black and white grid of squares. However this pattern is carefully crafted to ensure that a URL can be encoded in a robust fashion. Its therefore very difficult to create a QR code with a desirable pattern or structure.

This project will attempt to create QR codes that contain patterns of black and white squares that form an identifiable pattern or shape that is aesthetically appealing. The resulting QR codes may have a significant commercial value as compared to apparently randomly generated codes.