It has already been shown in the past that cyberattacks are more successful the more the attacker knows about the system to be attacked. If someone knows a vulnerability in a certain software and version combination, it is easy to exploit this vulnerability for attacks. To gain this knowledge, fingerprinting methods are often used to identify the hardware and software used in a system in order to launch targeted attacks. Due to the increasing number of internet-enabled vehicles, the growing threat of cyberattacks on vehicles and the experiences in the cybersecurity field regarding fingerprinting in the past, this prototype investigates what data can be extracted by visiting a website via the vehicle's internal browser. It is further investigated whether it is possible to create a specific fingerprint based on this data that can distinguish between manufacturer, model and software version of the vehicle.
Under Save Car you can help to expand our database by adding the publicly available browser data to our database and thus enable a more detailed analysis of the above mentioned topic.
Do you just want to check if your vehicle is recognized? Go to Check Car
The finished paper is available here: Link to paper
If you have any questions, feel free to leave me a message.
ic18m020@technikum-wien.at
Find a bug? Report it on the github issue board.
Thank you for participating in the research to increase the safety of connected vehicles.