Scission- Signal Characteristic-Based Sender Identification
Association for Computing Machinery (ACM) via YouTube
Power BI Fundamentals - Create visualizations and dashboards from scratch
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore an innovative Intrusion Detection System (IDS) called Scission in this 23-minute conference talk presented at the Association for Computing Machinery (ACM). Dive into the world of automotive cybersecurity, focusing on the vulnerabilities of the CAN bus and how Scission addresses the critical issue of sender authentication. Learn about the system's methodology, including sampling, preprocessing, model generation, and classification techniques used to extract fingerprints from CAN frames for identifying sending ECUs. Examine the evaluation process, stability considerations, and intrusion reaction mechanisms. Gain valuable insights into this cutting-edge approach to enhancing vehicle security and protecting against potential cyber attacks on connected ECUs.
Syllabus
Introduction
Scission Overview
Sampling and Preprocessing
Model Generation and Classification
Intrusion Detection
Evaluation
Stability
Reaction on intrusion
Conclusion
Taught by
Association for Computing Machinery (ACM)