SISSA Real-Time Monitoring of Hardware Functional Safety and Cybersecurity With In-Vehicle SOME IP Ethernet Traffic
SISSA Real-Time Monitoring of Hardware Functional Safety and Cybersecurity With In-Vehicle SOME IP Ethernet Traffic
Abstract—Scalable service-oriented middleware over IP these functions, there is a growing demand for high and flexible
(SOME/IP) is an Ethernet communication standard protocol in communication bandwidths, often realized through Automotive
the automotive open system architecture (AUTOSAR), promoting Ethernet (e.g., BroadR-Reach) and IP-based communication [1].
electronic control unit (ECU)-to-ECU communication over the IP
stack. However, SOME/IP lacks a robust security architecture, scalable service-oriented middleware over IP (SOME/IP) has
making it susceptible to potential attacks. Besides, random been specifically designed to meet automotive requirements,
hardware failure of ECU will disrupt SOME/IP communication. including compatible with automotive open system architecture
In this article, we propose SISSA, a SOME/IP communication (AUTOSAR) and ensuring fast response times [2]. It supports
traffic-based approach for modeling and analyzing in-vehicle devices of various sizes and operating systems, effectively
functional safety and cyber security. Specifically, SISSA models
hardware failures with the Weibull distribution and addresses complementing traditional vehicle network technologies, such
five potential attacks on SOME/IP communication, including as control area network (CAN) bus, media-oriented systems
Distributed Denial-of-Services, man-in-the-middle, and abnormal transport (MOST), and FlexRay [3].
communication processes, assuming a malicious user accesses the Despite these advantages, ECUs relying on SOME/IP
in-vehicle network. Subsequently, SISSA designs a series of deep communication still encounter challenges during operation,
learning models with various backbones to extract features from
SOME/IP sessions among ECUs. We adopt residual self-attention including random functional failures (safety) and malicious
to accelerate the model’s convergence and enhance detection cyberattack (security). ECUs typically constitute entities
accuracy, determining whether an ECU is under attack, facing wherein hardware and software collaborate closely. Inevitably,
functional failure, or operating normally. Additionally, we have hardware components encounter random hardware failures
created and annotated a data set encompassing various classes, during their lifecycle, thereby impacting the normal func-
including indicators of attack, functionality, and normalcy. This
contribution is noteworthy due to the scarcity of publicly acces- tioning of the ECU. Furthermore, SOME/IP specifications
sible data sets with such characteristics. Extensive experimental are devoid of security measures directly integrated into
results show the effectiveness and efficiency of SISSA. the protocol [4]. As a result, security vulnerabilities in
Index Terms—Electronic control units (ECUs), safety, scalable SOME/IP deployments introduce novel attack vectors that
service-oriented middleware over IP (SOME/IP), security. can be exploited to target victim vehicle [5]. Research has
demonstrated that numerous commercial vehicles display vul-
I. I NTRODUCTION nerabilities in network stack implementations, particularly in
Bluetooth, Wi-Fi, and 4G. Consequently, this exposes the
ECENT years have witnessed rapid advancements in the
R connected and automated vehicles (CAVs), whose key
features include the increasing number of electronic control units
potential for malicious entities to remotely access the internal
systems of cars [6].
To analyze the random functional failures and malicious
(ECUs). ECUs play a pivotal role in managing various vehicle
cyberattacks of automated vehicle, existing countermeasures
functions, such as the throttle, brake, and steering. To fulfill
can be divided into two categories: 1) risk assessment and
Manuscript received 2 April 2024; revised 21 April 2024; accepted 3 May 2) feature analysis. Hazard analysis and risk assessment
2024. Date of publication 7 May 2024; date of current version 8 August 2024. (HARA) and threat analysis and risk assessment (TARA)
This work was supported in part by the Henan Science and Technology are fundamental elements of risk assessment in the context
Major Project under Grant 221100240100; in part by the Shanghai Pujiang
Program under Grant 23PJ1403000; in part by the National Key Research and of CAVs. These processes play pivotal roles as essential
Development Program of China under Grant 2023YFB2504800; in part by stages within the ISO 26262 [7] and ISO/SAE 21434 stan-
the Songshan Laboratory Pre-Research Project under Grant YYJC042022016; dard [8], respectively. Typically, HARA employs failure-based
and in part by the Natural Science Foundation of Jiangsu Province under
Grant BK20230134. (Corresponding authors: Yufeng Li; Yanchen Liu.) methods, such as Fault Tree [9] and Failure Modes and
Qi Liu, Xingyu Li, Ke Sun, and Yanchen Liu are with the Effects Analysis (FMEA) [10], focusing on potential faults
School of Computer Engineering and Science, Shanghai University, and their impact on system safety. Additionally, system-based
Shanghai 200444, China (e-mail: [email protected]; [email protected];
[email protected]; [email protected]). approaches like HAZOP [11] and System Theoretic Process
Yufeng Li is with the School of Computer Engineering and Science, Analysis [12] comprehensively assess the system’s structure,
Shanghai University, Shanghai 200444, China, and also with the Endogenous operation, and environmental factors to evaluate overall safety.
Security Department, Purple Mountain Laboratories, Nanjing 211111, China
(e-mail: [email protected]). TARA, including methods like FMVEA [13], STPA-sec [14],
Digital Object Identifier 10.1109/JIOT.2024.3397665
2327-4662
c 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27323
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27324 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
A. Risk Assessment-Based
4) Protocol Version [8 Bits]: It identifies the used SOME/IP HARA is a pivotal part developed within functional safety
header format (excluding the payload format). standard ISO 26262. It systematically identifies and assesses
5) Interface Version [8 Bits]: It represents the main field potential hazards and risks within Electrical/Electronic
interface version. systems, offering guidance during the design and development
6) Message Type [8 Bits]: It is used to distinguish between phases to ensure that vehicles comply with rigorous func-
different types of packets. Normally, there are ten tional safety requirements throughout their entire lifecycle.
different message types for SOME/IP protocols. HARA employs failure-based and system-based methods. For
7) Return Code [8 Bits]: It is used to indicate whether a instance, Fault Tree [9] analyzes and represents the logical
request is successfully been processed. relationships among various potential faults and their con-
8) Payload [Variable Size]: It represents the information tributing events within a system. FMEA [10] evaluate sand
content to be delivered. prioritizes potential failure modes in a system, identifying their
causes and effects, and implementing preventive measures
to enhance safety. Besides, HAZOP (Hazard and Operability
B. Communication Model Study) [11] systematically identifies and assesses potential
In this section, we consider the communication model of hazards and operability issues by examining deviations from
SOME/IP. The SOME/IP protocol defines three main commu- the intended design conditions. STPA [12] mitigates hazardous
nication models as shown in Fig. 2. states and their corresponding causal factors within complex
Request/Response: The Request/Response pattern is one of systems by employing system theory principles.
the most common communication patterns, where a request is Aligned with vehicle cybersecurity standard ISO/SAE
initiated by one communication partner (client) and responded 21434, TARA ensures effective defense mechanisms and sig-
by another communication partner (server). Request/Response nificant cost savings in the early stages of vehicle development.
communication is essentially an RPC that consists of a request It systematically analyzes potential threats to vehicle systems,
and a response [28]. Specifically, a typical request bearing the determining hierarchical defense strategies and implement-
message type 0x00 anticipates a singular response denoted by ing corresponding mitigations based on identified threats.
the message type 0x80. TARA employs formula-based methods and model-based
Fire and Forget: This communication is an RPC that methods [29]. Formula-based methods, such as EVITA [30],
consists only of a request message. In the Fire and Forget com- HEAVENS [31], and SARA [32], mainly utilize tables, texts,
munication pattern, the request initiated by the message sender or formulas. Model-based methods, such as PASTA [33],
does not necessitate a response message. The request message STPA-sec [14], Attack Tree [34], etc., are utilized for modeling
type associated with this pattern is REQUEST_NO_RETURN. and analyzing the threats and risks of the system through
Events: This communication pattern entails a client send- data flow diagrams, graphs, and tree models. Formula-based
ing a subscription request to access a service. In certain TARA methods, due to their maturity and user-friendly nature,
scenarios, the server may dispatch an event to the client, enjoy broader adoption and usage, especially among users with
which means the client that sent the subscription request will limited security experience. Formula-based TARA methods
receive the service. Various sending strategies are employed are more mature and convenient for users without too much
for different events, including periodic updates from the security experience. As a result, they are more widely spread
server to the client or immediate notifications upon any and used. While model-based methods are more complex and
change in a value. It is noteworthy that, for both subscrip- therefore more difficult to understand and use.
tion and event messages, the designated message type is
NOTIFICATION. Importantly, when the server transmits an B. Feature Learning-Based
event to the client, the client is not required to provide a The vehicular abnormal detection aims to detect anoma-
response. lies by exploiting in-vehicle features. It is noteworthy that
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27325
TABLE I
C OMPARISON W ITH E XISTING V EHICULAR SOME/IP-BASED S AFETY AND S ECURITY A NALYSIS M ETHODS . T HE C RITERIA I NCLUDE :
THE E XPLOITED C OMMUNICATION M ODEL , THE T YPE OF D ETECTION A LGORITHMS , THE A NALYSIS TARGET, THE O PEN -S OURCE
DATA AND C ODE , AND W HETHER M EETING THE R EAL -T IME R EQUIREMENTS D EFINED IN IEEE 802.1DG [35].
RB AND ML I NDICATE THE RULE -BASED AND M ACHINE -L EARNING -BASED
abnormal detection on the CAN bus has advanced significantly, model, are employed to learn SOME/IP communication packet
supported by ample-related research literature. Existing CAN features and determine whether anomalies exist in the tar-
bus abnormal detection can be divided into ID-based methods, get ECU [22], [23], [24]. However, machine-learning-based
payload-based methods, signal-based methods, and indirect methods are specifically employed for detecting cyberattacks
features-based methods [40]. ID-based methods monitor the but are unable to pinpoint and distinguish between attack
entropy [16], frequency [41], and time arrival interval [42] of categories and malfunctions within the ECU.
frame ID, which will trigger an alarm when they exceed the Table I summarizes the major differences between SISSA
predesigned threshold. Payload-based methods usually adopt and the existing vehicular SOME/IP safety and security anal-
machine learning model, such as deep neural networks [43] ysis methods. The proposed SISSA utilizes established deep
and generative adversarial network [44], to learn the feature learning models, namely, CNN, RNN, and LSTM, incorpo-
of frame payload, determining abnormal pattern. Signal-based rated with a residual self-attention mechanism. It not only
methods analyze vehicle sensor data, such as speed and detects various types of cyber attacks, such as DDoS, MITM,
steering angle to detect anomalies [45], [46]. Additionally, and abnormal communication but also aids in identifying hard-
indirect features, such as ECU fingerprints [19], are used to ware random failures through SOME/IP traffic. Additionally,
locate the compromised ECU. However, above methods are our data and code are open-source, facilitating researchers in
suitable for stable CAN message sequences, but not applicable pursuing their studies.
to the dynamic and unpredictable nature of SOME/IP traffic.
While feature learning for SOME/IP is in its early stages,
with limited research in this area, efforts are being made IV. P ROPOSED S AFETY AND S ECURITY
to explore its potential. Based on the criteria: the exploited M ONITORING M ODEL
communication model, the type of analysis algorithms, the This section proposes a novel safety and security monitoring
analysis target, the open-source data and code, and the framework, as illustrated in Fig. 3. ECUs communicate with
real-time capacity, we review recent SOME/IP-based safety each other via the SOME/IP protocol in Ethernet, which can
and security analysis methods in Table I. Cryptography and be susceptible to functional failures and cyberattacks. We first
Authentication techniques are adopted to secure SOME/IP model scenarios involving functional failure and cyberattck in
communication between ECUs [3], [4], [36], [39]. However, the communication of ECUs through SOME/IP. Subsequently,
the application of encryption authentication methods tends to training module is developed using unlabeled real-world data,
introduce increased communication complexity, elevated com- employing deep learning models to extract characteristics
putational overhead, and additional latency. Koyama et al. [38] from SOME/IP sessions among ECUs. We incorporate a
proposed to real-timely detect anomalies through whitelist- residual self-attention block (RSAB) to accelerates the model’s
based ways. Notably, their focus is primarily on mitigating convergence and enhances detection accuracy. Finally, during
replay attacks and MITM attacks. To enhance detection the detection phase, the proposed model operates online to
accuracy and broaden the spectrum of detected attack types, analyze SOME/IP traffic in real time and conducts analysis on
machine learning models, such as recurrent neural network the targeted ECU to determine its operational status, whether
(RNN), gated recurrent unit (GRU), and Vaswani’s transformer it is functioning normally, experiencing functional failure, or
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27326 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27327
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27328 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
Fig. 6. Vulnerabilities of SOME/IP and construct the attack scenario, including (a) and (e) abnormal communication process, (d) DDoS attack, and (b) and
(c) MITM attack.
Fig. 7. (Top) Training process. (Bottom) Details of (a) data preprocessing, (b) PMB, and (c) residual attention block.
timestamps, they will display discernible image patterns that where the singleton dimension symbolizes a single-channel
differentiate normal behavior from anomalies. Such a premise grayscale image. Subsequently, a bespoke sampling algorithm,
paves the way for leveraging CNN-based architectures to bilinear interpolation, reformats the data into a 1×n×n image.
discern and categorize intrusions. This processed image is then propagated through a sequence
In the context of our proposed models, i.e., SISSA-C (CNN of convolutional blocks. Each block comprises a convolutional
backbone is employed in SISSA) and SISSA-C-A (CNN layer (Conv), followed by a Max Pooling layer (MaxPool),
backbone incorporated with residual self-attention is employed and a batch normalization layer (BN). The operations within
in SISSA), we employ a CNN backbone as the principal these blocks can be formally described as follows: for a given
mechanism for feature extraction and pattern recognition. The convolutional block Bi , the transformation T applied to the
detailed schematic of this CNN backbone is elucidated in input I is
Fig. 7. Input data, represented in an n×d matrix, undergoes an
initial transformation to a 3-D tensor with dimensions 1×n×d, T(I) = BN(MaxPool(Conv(I))). (2)
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27329
To encapsulate interchannel relationships and the intricate the field of intrusion detection, the LSTM’s architecture is
feature interplay, the channels corresponding to each pixel adept at analyzing and learning from the intricate temporal
are subject to a nonlinear mapping. This mapping, designed patterns that characterize different attack vectors and fault
to extract the nuanced associations between diverse channels, conditions. The ability of LSTM to mitigate the vanishing
further refines the model’s intrusion detection capabilities. The gradient problem prevalent in traditional RNNs allows for
nonlinear mapping M between the channels for a pixel p is more effective learning over extended sequences, which is
expressed as paramount in the nuanced classification tasks presented by
multiple attack and fault modes [53], [54], [55]. The distinct
M(p) = f (p1 , p2 , . . . , pc ) (3) advantage of LSTM in handling such tasks stems from its
where f represents the nonlinear function, and p1 , p2 , . . . , pc unique gate-based architecture, which is particularly adept at
are the channel values of pixel p across c channels. capturing the temporal characteristics inherent in hacker attack
The amalgamation of these computational layers and the patterns [56] and the sporadic functional failures of in-vehicle
nonlinear mapping engenders a robust framework capable of ECUs.
identifying anomalous patterns indicative of cyber attack and Fig. 7 illustrates the LSTM backbone composed of multiple
random hardware failure. LSTM blocks. These blocks are embedding into SISSA-L
4) RNN Backbone: Although CNNs have been a conven- (LSTM backbone is employed in SISSA) and SISSA-L-A
tional choice for intrusion detection, their effectiveness in (LSTM backbone incorporated with residual self-attention
interpreting sequential data remains limited. Different from is employed in SISSA). Each block processes an input
that, sequence-based neural networks could potentially offer sequence of n packets, with each packet characterized by
superior generalization capabilities, particularly in the context a d-dimensional feature vector. The LSTM block is set to
of processing continuous message streams [51]. iteratively update its cell states and hidden states through a
Fig. 7 delineates the architecture of our proposed sequence- series of gated operations—input, output, and forget gates,
based models, SISSA-R (RNN backbone is employed in thus selectively retaining or discarding information through
SISSA) and SISSA-R-A (RNN backbone incorporated with the sequence.
residual self-attention is employed in SISSA). These models Formally, the LSTM updates for each time step t in a given
integrate RNN blocks, designed to capture temporal depen- block Bi can be described by the following equations:
dencies and extract timing features from sequences of network
packets. The RNN blocks are structured to process an input ft = σ Wf · ht−1 , xt + bf
window comprising n packets, with each packet represented it = σ Wi · ht−1 , xt + bi
as a vector of dimension d.
Ct = tanh Wc · ht−1 , xt + bC
In the context of SOME/IP communication, encompassing
both attack and fault scenarios, we carefully adhere to the tem- Ct = ft ∗ Ct−1 + it ∗
Ct
poral accuracy of packet transmission. This temporal aspect ot = σ Wo · ht−1 , xt + bo
may elude the feature detection capacities of purely image- ht = ot ∗ tanh(Ct ) (6)
based pattern recognition systems. Therefore, we introduce a
multilayered RNN architecture to address this challenge. The where ft , it , and ot represent the forget gate, input gate, and
architecture functions as follows. output gate activations, respectively; Ct and ht are the cell state
For each RNN block Bi , the transformation T across a and hidden state; σ denotes the sigmoid function; and W and
sequence of length n is defined recursively by b are the weights and biases associated with each gate.
ht = f (ht−1 , xt ; θ ) (4) The architectural schematic translates to a transformation
pathway
where ht is the hidden state at time t, xt is the input at time
t, and θ represents the parameters of the RNN. LSTM Block 1 LSTM Block 2
c(n, d) −−−−−−−−→ (n, h) −−−−−−−−→ (n, h). (7)
The schematic progression can be summarized as
RNN Block 1 RNN Block 2 Each LSTM block’s output, ht , encodes not only the
(n, d) −−−−−−−→ (n, h) −−−−−−−→ (h, d). (5)
information of the current packet but also the context of
Each RNN block captures and propagates temporal preceding packets. This makes it a valuable resource for
information through its hidden states, thereby facilitating an identifying patterns that signal anomalies, even in inputs with
intricate understanding of the temporal patterns characteristic intricate temporal dynamics.
of intrusion scenarios. By harnessing this architecture, SISSA- By harnessing the LSTM backbone within our proposed
R and SISSA-R-A aim to provide an in-depth analysis of models (SISSA-R and SISSA-R-A), we aim to elevate the
network traffic, potentially outperforming traditional CNN- accuracy and generalization of monitoring system to adeptly
based approaches in detecting sophisticated cyber attacks. handle the multifarious and temporally complex patterns
5) LSTM Backbone: LSTM is capable of capturing long- observed in functional failure and attack.
range dependencies within a sequence, making it eminently 6) Residual Self-Attention Block: RSAB aims to enhance
suitable for scenarios where messages that are far apart the network’s ability to discern complex and subtle relation-
within a window may exert a significant impact [52]. In ships within the data. This is crucial for differentiating patterns
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27330 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
QK T
Attention(x) = Softmax √ V (8)
dk
V. E VALUATION
where Q, K, and V are the query, key, and value matrices A. Experimental Settings
derived from the input data x, and dk is the scaling factor
1) Data Set: In our comprehensive open-source framework
corresponding to the dimension of the keys. This attention
(SISSA), we delineate a holistic approach encompassing the
function allows the network to prioritize certain messages
generation of data that comply with the AUTOSAR stan-
within a window, which is crucial when a single malicious
dard, the simulation of various attacks and random hardware
packet could indicate a potential attack.
failures, alongside detailed data preprocessing and network
The RSAB enhances this mechanism by adding a residual
training methodologies.
connection, which is simply the addition of the input of the
The SOME/IP Generator, a Python-based tool for gener-
block to its output
ating SOME/IP packets based on IP/UDP, is available on
RSAB(x) = x + Attention(Q, K, V). (9) GitHub and has been extensively utilized in relevant intru-
sion detection [57], [24]. This generator employs Python’s
The inclusion of the residual connection facilitates gradient native multiprocessing components and multiple communica-
flow during backpropagation and helps mitigating the van- tion queues to effectively simulate the traffic of SOME/IP
ishing gradient problem, which is a common issue in deep packets among various ECUs within the same local area
networks. This is particularly advantageous for analyzing network over continuous time. However, due to the prolonged
complex network traffic data, where the relevance of specific lack of maintenance of the GitHub repository, the generator
features may be deeply buried in the sequence. faces challenges in implementing modern, complex message
For network traffic analysis, including the detection of behaviors. For instance, the packet generation process does
normal versus malicious activities or identifying ECU mal- not fully adhere to real-world timing constraints, rendering
functions, the ability of RSAB to focus on specific, relevant it inadequate for simulating attacks that are highly time-
parts of the data becomes crucial. Network attacks like sensitive. Moreover, the generator’s current design does not
DDoS or MITM, and ECU malfunctions exhibit characteristic effectively represent the random hardware malfunctions in the
patterns within the vast stream of network data. RSAB, by communication queue.
dynamically weighting input features, can effectively highlight Given these limitations, we propose enhancements to the
these patterns, making it easier for subsequent layers of the SOME/IP Generator. Our approach leverages its multi-ECU
model to recognize and classify them accurately. The model communication simulation capabilities to first generate stan-
can thus learn to discern subtle differences between normal dard SOME/IP traffic packets. Subsequently, we aim to model
and anomalous traffic, improving its predictive performance. in-vehicle functional safety and cyber security threats. This
Moreover, the residual connection in RSAB ensures that, will be achieved through custom scripts that can generate spe-
alongside these weighted features, the original input is also cific attack message windows and simulate random hardware
carried forward, preventing the loss of information that might failure message windows, thereby providing a more robust and
be crucial for understanding the context of the traffic. This realistic testing environment for monitoring systems. Access
is particularly important for network traffic data, where the to both the code and data sets is available at the following
context can significantly influence the interpretation of a link: https://github.com/jamesnulliu/SISSA.
message’s normalcy or anomaly. Fig. 8 shows the data set generation process for SOME/IP.
After RSAB and multilayer perceptron, the final output of By utilizing the SOME/IP Generator, we initiate the process
SISSA models is a tensor with the shape of (7, 1), indicating by generating typical SOME/IP communication data. This data
the probability of the input window being normal, suffering is subsequently processed through our data segmentation mod-
from DDoS, FI, FS ReqNoRes, ResNoReq attack, or Random ule. In this phase, the continuous stream of data is partitioned
Hardware Failure, respectively. into distinct blocks. These blocks are subjected to simulated
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27331
TABLE II
T RAINING AND T ESTING DATA S ET C LASSES
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27332 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
Fig. 10. Train accuracy and loss of each SISSA model. (a) CNN-based models. (b) RNN-based models. (c) LSTM-based models.
2) Recall quantifies the model’s ability to correctly identify The stagnation in validation accuracy observed in the
all relevant instances among the actual positives, empha- SISSA-C and SISSA-C-A models is attributed to the temporal
sizing the avoidance of FNs (TP/TP + FN). nature of the attack and random failure modes delineated in
3) Precision gauges the model’s accuracy in labeling our study. These temporal characteristics are inadequately cap-
instances as positive, emphasizing the avoidance of FPs tured by convolutional image classification neural networks,
and assessing the relevance of the identified positives rendering them suboptimal for intrusion and fault detection
(TP/TP + FP). tasks that exhibit specific characteristics.
4) F1-score is the harmonic mean of precision and The SISSA-L-A model stands out as our recommended
recall, offering a balanced measure that considers solution for achieving the highest validation accuracy in
both FPs and FNs, suitable for evaluating mod- seven distinct classification scenarios. Owing to its integration
els in scenarios with imbalanced class distribution of LSTM and RSA modules, the SISSA-L-A is adept at
([2 × Precision × Recall]/Precision + Recall). extracting correlations between packet features across different
5) ROC Curve assesses model performance in neural timestamps in a window sequence. This capability enables it to
networks. It plots FP Rate and TP Rate for different effectively identify characteristics of SOME/IP traffic during
discrimination thresholds. The ideal ROC curve should vehicular attacks or random hardware failures.
be closer to the upper left corner, indicating better 2) Performance in Monitoring: Fig. 11 presents the confu-
performance. sion matrices for each of the six evaluated models. An analysis
6) AUC Scores quantify the area under the right side of the of these confusion matrices reveals that both the SISSA-C and
ROC curve, providing a visual measure of the classifier’s SISSA-C-A exhibit lower detection rates and higher FP rates,
predictive performance. In cases where ROC curves for particularly in scenarios involving DDoS attacks, FS attacks,
different classes intersect, the AUC values serve as a and random hardware failures. This diminished performance
quantitative criterion to determine which class exhibits is attributed to the temporal dynamics inherent in these attack
superior predictive performance. types, a feature that proves challenging for CNN-based models
to effectively capture and analyze.
Conversely, SISSA-L-A demonstrates remarkable efficacy,
B. Experimental Performance as evidenced by the near absence of detection errors and
1) Performance in Training: Fig. 10 illustrates the training FPs in Fig. 11. This observation underscores the superior
performance of six distinct SISSA models. These models were performance of the model, particularly in its ability to accu-
trained for a maximum of 150 epochs, with hyperparameters rately identify and classify attack patterns and hardware
finely tuned within this constraint to optimize training efficacy. malfunction. The results suggest that SISSA-L-A’s archi-
Of the six variants based on varying architectures, the SISSA- tecture, which likely leverages advanced temporal feature
L-A model exhibited superior performance, achieving the extraction capabilities, is better suited for handling the com-
highest validation accuracy of 99.7% across seven classifica- plexities associated with these specific types of attacks.
tion tasks. Conversely, the CNN-based model demonstrated Fig. 12 shows the ROC curves and AUC values for six
limited generalization capacity, though it attained a notable models with different backbones. It can be observed that the
training accuracy of 99.5%, translating to a lower validation AUC values of LSTM-based models (SISSA-L and SISSA-
accuracy of 72%. L-A) are range from a minimum of 0.93, with the majority
In Fig. 10(a) and (b), it is evident that the incorporation approaching 1. This indicates that LSTM-based models can
of an RSA layer at the network’s terminus not only sta- effectively distinguish between each type of attack, demon-
bilizes the training process but also significantly enhances strating superior performance.
validation accuracy. Furthermore, scenario Fig. 10(c) reveals The SISSA-C and SISSA-C-A models illustrated in
that the SISSA-L-A model, in comparison to its SISSA-L Fig. 12(a) and (b) exhibit a distinct pattern. The ROC
counterpart, exhibits improved generalization capabilities, curves associated with these models deviate from the typical
particularly under extended training durations. convergence toward the upper left corner. Simultaneously,
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27333
Fig. 11. Confusion matrix for six different models on the testing data set. (a) and (b) CNN-based models. (c) and (d) RNN-based models. (e) and
(f) LSTM-based models.
Fig. 12. ROC curves and AUC values for six models with different backbones across seven classification tasks. (a) and (b) CNN-based models. (c) and
(d) RNN-based models. (e) and (f) LSTM-based models.
the AUC values they entail indicate challenges in accurately In the case of Fig. 12(c) and (d), the ROC curves for
discerning various attacks, resulting in reduced predictive the RNN-based models tend to converge toward the upper
accuracy. left corner, suggesting commendable predictive accuracy.
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27334 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
Fig. 13. (a) Overall accuracy, (b) precision, (c) recall, and (d) F1-score of each class on the testing data set under different window sizes.
TABLE III
However, its performance falls slightly short of the LSTM- C OMPARISON OF THE ACCURACY, P RECISION , R ECALL ,
based models. These observations collectively underscore the AND F1-S CORE OF E ACH SISSA M ODEL
efficacy of the models and highlight the impact of incorpo-
rating RSA, particularly evident in the enhanced predictive
capabilities of the LSTM-based model.
Fig. 13 delineates the comparative performance of six
distinct models as a function of varying window sizes. In
the conducted experiments, the SISSA-L-A and SISSA-L
models consistently outperformed their counterparts across
all four measured metrics. It was observed that with an
increase in window height, the RNN-backed models (SISSA-R
and SISSA-R-A) exhibited a remarkable improvement in
all measures. Conversely, models predicated on a CNN-
based backbone did not demonstrate significant alterations
in performance. This phenomenon can be attributed to the
RNN and LSTM’s inherent capability to exploit temporal
information provided by an enlarged window, thereby enhanc-
ing the model’s performance. In contrast, the SISSA-C and
SISSA-C-L models appear to be less adept at capturing
temporal characteristics and the intermessage associations,
leading to a stagnant performance outcome. Additionally, it
is noted that the integration of an RSA generally enhances
the model’s overall metrics. However, it necessitates a more
extended training duration to reach optimal efficacy, compared
to its counterparts devoid of the RSA. formatted to emphasize the highest metric values for each cat-
Table III presents a comprehensive evaluation of six distinct egory by employing bold typeface. This accentuation reveals
SISSA models across three categorical scenarios: 1) normal that the SISSA-L-A model exhibits superior performance,
message windows; 2) malicious attack message windows; and achieving near-perfect accuracy in the identification of mali-
3) random hardware failure message windows. The table is cious attack message windows. It is noteworthy, however, that
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27335
TABLE IV
C OMPARISON OF THE ACCURACY, P RECISION , R ECALL , AND F1-S CORE of accuracy, precision, recall, and F1-score. The results high-
OF E ACH C LASS U NDER E ACH SISSA M ODEL light that, given a sufficient training set, the detection rate
for FI attacks by all six proposed models is near perfect.
The models exhibit varying degrees of efficacy in identifying
other forms of attacks and random hardware failures, which is
reflective of their differential capabilities in temporal feature
extraction. Notably, the SISSA-L-A model stands out with the
most robust performance, demonstrating high accuracy in the
recognition of diverse attack vectors and random functional
failures. This suggests that the synergy between the LSTM
backbone and RSA is particularly adept at discerning between
multiple attack patterns and hardware malfunctions within
multinode SOME/IP communication.
3) Overhead: Table V presents a comprehensive analysis
of parameters and time costs associated with six distinct
models, comparing them across various window sizes. It is
observed that an increase in window height results in a slower
detection speed, attributed to the simultaneous increase in the
number of parameters. When comparing models with identical
window values, those incorporating RSA tend to exhibit higher
parameter counts and slower detection times compared to
counterparts without RSA. Furthermore, notable differences in
parameter quantities exist among different model architectures.
In particular, the SISSA-L model exhibits a higher parameter
count and longer detection time in comparison to SISSA-R,
the latter surpassing SISSA-C in both aspects. Meanwhile,
the graphics memory increases with the growth of window
length. Considering that the resolution of message data itself is
not substantial, memory usage is unlikely to pose a hindrance
in practical applications. It is noteworthy to mention that
detection time of SISSA is less than 1 ms, which can meet
in-vehicle network traffic and real-time requirements defined
in IEEE 802.1DG [35]. This demonstrates that the SISSA-
L-A model is capable of achieving real-time detection in a
vehicular environment, confirming its practicality not only
on high-end computational platforms but also on hardware
with considerably lower performance, such as the Raspberry
Pi. This versatility in operating environments underscores the
model’s potential for widespread application in real-world
scenarios.
VI. D ISCUSSION
A. Real-World Application
In the experimental evaluation, we observed distinct vari-
ations in detection rates and speeds among the six SISSA
models that developed for identifying cyber attacks and ran-
dom hardware failures. Owing to the comprehensive Python
during the detection of random hardware failure message win- code framework, SISSA can be seamlessly integrated as a
dows, the recall metric for SISSA-L-A is marginally eclipsed middleware within automotive communication networks to
by that of SISSA-L. This suggests a propensity of the SISSA- facilitate real-time monitoring of SOME/IP network activities.
L-A model to occasionally misclassify normal operational If this middleware operates in a strictly localized environment,
modes as faulty. This phenomenon may be attributed to a the SISSA network itself remains safeguarded against external
degree of overfitting engendered by the RSA within the attacks. Conversely, when connected to cloud services, the
model’s architecture, underscoring a potential area for further model’s efficiency can be incrementally enhanced in alignment
refinement. with vehicular modifications, allowing for the transmission of
Table IV elucidates the performance of each SISSA model anomalous states back to remote data centers. Additionally,
across seven classification categories, focusing on the metrics the versatility of SISSA is evident in its capacity to adapt
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27336 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
TABLE V
SISSA’ S C HARACTERISTICS AND C OMPUTATIONAL R ESOURCES
to varying packet traffic types through modifications in its further may yield diminishing returns in accuracy relative to
structural design and the data set used for training. the augmented inference time. Furthermore, it is worth noting
In practical applications, critical factors, such as the model’s that the low-dimensional nature of the message data results in a
detection rate, inference time, and memory usage, must be minimal GPU memory footprint during inference. This aspect
meticulously considered. Tailoring the window length and underscores the feasibility of running SISSA for safety and
model structure to suit the complexity of communication security analyses in automotive systems without significantly
scenarios is imperative. For instance, in our specific use impacting other GPU-based tasks. Such an attribute is vital
case, employing the SISSA-L-A model with an LSTM back- for the practical deployment of the application.
bone and a monitoring window of 128 consecutive packets, This article discusses SOME/IP traffic data, including noti-
we achieved a remarkable 99.7% accuracy across seven fications, requests, and responses, and simulates the feasibility
classification challenges. Concurrently, the model’s inference of real-world application scenarios. In future work, we will
time aligns with the prerequisites for real-time monitoring. consider the potential integration of vSOMEIP and the inclu-
However, it should be noted that increasing the window height sion of SOME/IP-SD traffic, further exploring security checks
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27337
within the entire process between two ECUs, from service also accommodating the computational resource requirements
provision to connection establishment and communication. of ECUs.
In the future, we intend to expand the scope of our
framework to encompass additional in-vehicle communication
B. Limitations
protocols, including the well-established CAN bus. Besides,
1) False Positives: Although the proposed method boasts modeling cyberattacks on in-vehicle networks emerges as an
a high level of accuracy, it still suffers from nonnegligible intriguing and worthwhile avenue for exploration.
FPs. Modern vehicles are typically equipped with dozens
to hundreds of ECUs. Therefore, the model presented in
this article requires further optimization to reduce FPs, thus R EFERENCES
adapting to the real-time environment of vehicular systems. [1] M. Iorio, A. Buttiglieri, M. Reineri, F. Risso, R. Sisto, and F. Valenza,
On the other hand, attacks are effective when sustained. “Protecting in-vehicle services: Security-enabled SOME/IP middle-
ware,” IEEE Veh. Technol. Mag., vol. 15, no. 3, pp. 77–85, Sep. 2020.
Taking DoS as an example, malicious users aim to disrupt [2] (AUTOSAR Found., Munich, Germany). SOME/IP Protocol
normal operations by inundating the network with an excessive Specification. 2022. Accessed: Apr. 20, 2023. [Online].
amount of false requests or abnormal data packets. This Available: https://www.autosar.org/fileadmin/standards/R22-
11/FO/AUTOSAR_PRS_SOMEIPProtocol.pdf
strategy, to some degree, helps alleviate the problem of FPs [3] D. Zelle, T. Lauser, D. Kern, and C. Krauß, “Analyzing and securing
stemming from cyber attacks. some/ip automotive services with formal and practical methods,” in Proc.
2) Cyberattack Traffic Pattern Generation: Different win- 16th Int. Conf. Avail., Rel. Secur., 2021, pp. 1–20.
[4] M. Iorio, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Securing
dows are tailored to different attack scenarios, achieved SOME/IP for in-vehicle service protection,” IEEE Trans. Veh. Technol.,
through varying parameter values, and there are no loop vol. 69, no. 11, pp. 13450–13466, Nov. 2020.
conditions. A limitation lies in the fact that in real-world [5] F. C. Gail, R. Rieke, and F. Fenzl, “RulEth: Genetic programming-driven
derivation of security rules for automotive Ethernet,” in Proc. Joint Eur.
scenarios, a single window may encounter multiple types of Conf. Mach. Learn. Knowl. Discov. Databases, 2023, pp. 192–209.
attacks. This aspect was not accounted for in our study and [6] C. Miller and C. Valasek, “Remote exploitation of an unaltered passenger
requires further investigation in future research. vehicle,” Black Hat USA, vol. 2015, no. 91, pp. 1–91, 2015.
[7] Road Vehicles—Functional Safety, ISO Standard 26262, Dec. 2016.
3) Potential Pitfalls in Machine Learning for [8] Road Vehicles, Cybersecurity Engineering, ISO/SAE Standard 21434,
Cybersecurity: As SOME/IP was proposed by the BMW 2021.
and is not yet widely used like CAN, obtaining real data [9] E. Ruijters and M. Stoelinga, “Fault tree analysis: A survey of the
state-of-the-art in modeling, analysis and tools,” Comput. Sci. Rev.,
for SOME/IP is challenging. In this case, SOME/IP data is vols. 15–16, pp. 29–62, Feb.–May 2015.
generated using open-source tools, such as vSOME/IP and [10] H.-C. Liu, L. Liu, and N. Liu, “Risk evaluation approaches in failure
SOME/IP Generator, leading to potential sampling bias, as mode and effects analysis: A literature review,” Expert Syst. Appl.,
outlined in [58]. Concurrently, due to the data set’s singularity, vol. 40, no. 2, pp. 828–838, 2013.
[11] J.-P. Signoret and A. Leroy, “Hazard and operability study
slight overfitting may occur with the proposed SISSA-C. (HAZOP),” in Reliability Assessment of Safety and Production Systems:
However, since LSTM-L-A has learned almost all patterns Analysis, Modelling, Calculations and Case Studies. Cham, Switzerland:
in our data set and performs well on both the training and Springer, 2021, pp. 157–164.
[12] N. G. Leveson, Engineering a Safer World: Systems Thinking Applied
validation sets, it effectively addresses the overfitting issue. It to Safety. Cambridge, MA, USA: MIT, 2016.
is noteworthy that the aim of this study is to experimentally [13] C. Schmittner, Z. Ma, and P. Smith, “FMVEA for safety and security
demonstrate the superior performance of LSTM-L-A through analysis of intelligent and cooperative vehicles,” in Proc. Int. Conf.
Comput. Saf., Rel., Secur., 2014, pp. 282–288.
comparative analysis. [14] W. Young and R. Porada, “System-theoretic process analysis for security
(STPA-SEC): Cyber security and STPA,” in Proc. STAMP Conf., 2017,
pp. 1–69.
VII. C ONCLUSION [15] J. Cui and B. Zhang, “VeRa: A simplified security risk analysis method
for autonomous vehicles,” IEEE Trans. Veh. Technol., vol. 69, no. 10,
In this work, we propose a novel approach, termed SISSA, pp. 10494–10505, Oct. 2020.
to monitoring the safety and security of ECUs in con- [16] M. Müter and N. Asaj, “Entropy-based anomaly detection for in-vehicle
networks,” in Proc. 4th IEEE Intell. Veh. Symp., 2011, pp. 1110–1115.
nected automated vehicles using SOME/IP communication [17] C. Miller and C. Valasek, “Adventures in automotive networks and
traffic. SISSA employs Weibull distribution to model random control units,” IOActive, Seattle, WA, USA, White Paper, 2013.
hardware failures and identifies five classic cyberattacks. [18] M. Müter, A. Groll, and F. C. Freiling, “A structured approach to
anomaly detection for in-vehicle networks,” in Proc. 6th Int. Conf. Inf.
Leveraging three deep learning models with residual self- Assur. Secur., 2010, pp. 92–98.
attention mechanisms, SISSA effectively extracts features [19] K.-T. Cho and K. G. Shin, “Fingerprinting electronic control units for
from SOME/IP packets to distinguish between normal ECU vehicle intrusion detection,” in Proc. 25th USENIX Security Symp., 2016,
pp. 911–927.
operation, functional failures, and cyberattacks. We have
[20] Y. Xun, Y. Zhao, and J. Liu, “VehicleEIDS: A novel external intrusion
curated a comprehensive data set encompassing various classes detection system based on vehicle voltage signals,” IEEE Internet Things
for evaluation, a noteworthy contribution given the scarcity J., vol. 9, no. 3, pp. 2124–2133, Feb. 2022.
of publicly available data sets with similar characteristics. [21] W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “VoltageIDS: Low-
level communication characteristics for automotive intrusion detection
The experimental results indicate SISSA’s high effectiveness, system,” IEEE Trans. Inf. Forensics Security, vol. 13, pp. 2114–2129,
achieving an average F1-score of 99.2% for malfunction 2018.
identification and a perfect average F1-score of 99.86% for [22] N. Alkhatib, H. Ghauch, and J.-L. Danger, “Some/ip intrusion detection
using deep learning-based sequential models in automotive Ethernet
cyberattack detection. The detection speed and model overhead networks,” in Proc. IEEE 12th Annu. Inf. Technol., Electron. Mobile
meet the communication needs of automotive networks while Commun. Conf. (IEMCON), 2021, pp. 0954–0962.
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
27338 IEEE INTERNET OF THINGS JOURNAL, VOL. 11, NO. 16, 15 AUGUST 2024
[23] F. Luo, Z. Yang, Z. Zhang, Z. Wang, B. Wang, and M. Wu, “A [48] V. Prasanth, D. Foley, and S. Ravi, “Demystifying automotive safety
multi-layer intrusion detection system for some/IP-based in-vehicle and security for semiconductor developer,” in Proc. IEEE Int. Test Conf.
network,” Sensors, vol. 23, no. 9, p. 4376, 2023. (ITC), 2017, pp. 1–10.
[24] N. Alkhatib, M. Mushtag, H. Ghauch, and J.-L. Danger, “Here comes [49] A. Kleyner and R. Knoell, “Calculating probability metric for random
SAID: A SOME/IP attention-based mechanism for intrusion detec- hardware failures (PMHF) in the new version of ISO 26262 functional
tion,” in Proc. 14th Int. Conf. Ubiquitous Future Netw. (ICUFN), 2023, safety-methodology and case studies,” SAE, Warrendale, PA, USA,
pp. 462–467. Technical Paper 2018-01-0793, 2018.
[25] T. Gehrmann and P. Duplys, “Intrusion detection for SOME/IP: [50] R. Zhao, Y. Wang, Z. Xue, T. Ohtsuki, B. Adebisi, and G. Gui,
Challenges and opportunities,” in Proc. 23rd Euromicro Conf. Digit. “Semi-supervised federated learning based intrusion detection method
Syst. Design (DSD), 2020, pp. 583–587. for Internet of Things,” IEEE Internet Things J., vol. 10, no. 10,
[26] “SOME/IP protocol specification, Release R19-11,” AUTOSAR Found., pp. 8645–8657, May 2023.
Munich, Germany, document 696, 2019. [51] W. Chen, F. Lyu, F. Wu, P. Yang, and J. Ren, “FLAG: Flexible, accurate,
[27] “Scalable service-oriented middleware over IP (SOME/IP).” 2024. and long-time user load prediction in large-scale WiFi system using
[Online]. Available: https://some-ip.com/ deep RNN,” IEEE Internet Things J., vol. 8, no. 22, pp. 16510–16521,
[28] (AUTOSAR Found., Munich, Germany). SOME/IP Service Nov. 2021.
Discovery Protocol Specification. 2022. Accessed: Apr. 20, 2023. [52] J. Gao et al., “Omni SCADA intrusion detection using deep learning
[Online]. Available: https://www.autosar.org/fileadmin/standards/R22- algorithms,” IEEE Internet Things J., vol. 8, no. 2, pp. 951–961,
11/FO/AUTOSAR_PRS_SOMEIPServiceDiscoveryProtocol.pdf Jan. 2021.
[29] F. Luo, Y. Jiang, Z. Zhang, Y. Ren, and S. Hou, “Threat analysis and risk [53] I. Sutskever, O. Vinyals, and Q. V. Le, “Sequence to sequence learning
assessment for connected vehicles: A survey,” Secur. Commun. Netw., with neural networks,” in Proc. Adv. Neural Inf. Process. Syst., vol. 27,
vol. 2021, pp. 1–19, Sep. 2021. 2014, pp. 1–9.
[30] O. Henniger, A. Ruddle, H. Seudié, B. Weyl, M. Wolf, and T. Wollinger, [54] J. Kim, J. Kim, H. L. T. Thu, and H. Kim, “Long short term memory
“Securing vehicular on-board IT systems: The EVITA project,” in Proc. recurrent neural network classifier for intrusion detection,” in Proc. Int.
VDI/VW Automot. Secur. Conf., 2009, p. 41. Conf. Platform Technol. Service (PlatCon), 2016, pp. 1–5.
[31] SAE Cybersecurity Guidebook for Cyber-Physical Automotive Systems, [55] R. C. Staudemeyer and E. R. Morris, “Understanding LSTM—A
SAE Standard J3061, 2017. tutorial into long short-term memory recurrent neural networks,” 2019,
[32] J.-P. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel, and arXiv:1909.09586.
P. Urien, “SARA: Security automotive risk analysis method,” in Proc. [56] X. Yuan, C. Li, and X. Li, “DeepDefense: identifying DDoS attack via
4th ACM Workshop Cyber-Phys. Syst. Security, 2018, pp. 3–14. deep learning,” in Proc. IEEE Int. Conf. Smart Comput. (SMARTCOMP),
[33] S. Kim, R. Shrestha, S. Kim, and R. Shrestha, “Internet of Vehicles, 2017, pp. 1–8.
vehicular social networks, and cybersecurity,” Automotive Cyber [57] “Some-ip generator.” Egomania. 2016. [Online]. Available:
Security: Introduction, Challenges, and Standardization. Singapore: https://github.com/Egomania/SOME-IP_Generator
Springer, 2020, pp. 149–181. [58] D. Arp et al., “Dos and don’ts of machine learning in computer
[34] D. Ren, S. Du, and H. Zhu, “A novel attack tree based risk assessment security,” in Proc. 31st USENIX Security Symp., 2022, pp. 3971–3988.
approach for location privacy preservation in the vanets,” in Proc. IEEE
Int. Conf. Commun. (ICC), 2011, pp. 1–5.
[35] “Time-sensitive networking task group,” Piscataway, NJ, USA, docu-
ment 802.1, 2019. [Online]. Available: https://1.ieee802.org/tsn/802-1dg/
[36] B. Ma et al., “An authentication and secure communication scheme for
in-vehicle networks based on SOME/IP,” Sensors, vol. 22, no. 2, p. 647,
2022.
[37] A. Casparsen et al., “Closing the security gaps in some/ip through
implementation of a host-based intrusion detection system,” in Proc. Qi Liu received the B.S. degree in network
25th Int. Symp. Wireless Pers. Multimedia Commun. (WPMC), 2022, engineering from Suzhou University, Suzhou, China,
pp. 436–441. in 2017, and the master’s degree in computer science
[38] T. Koyama, M. Tanaka, A. Miyajima, S. Ukai, T. Sugashima, and and technology from Zhejiang Normal University,
M. Egawa, “SOME/IP intrusion detection system using real-time and Jinhua, China, in 2020. He is currently pursuing
retroactive anomaly detection,” in Proc. IEEE 95th Veh. Technol. Conf., the Ph.D. degree with the School of Computer
2022, pp. 1–7. Engineering and Science, Shanghai University,
[39] S. Lee, W. Choi, and D. H. Lee, “Protecting SOME/IP communication Shanghai, China.
via authentication ticket,” Sensors, vol. 23, no. 14, p. 6293, 2023. He is employed with Purple Mountain
[40] G. Zhang, Q. Liu, C. Cao, J. Li, and Y. Li, “Bit scanner: Anomaly detec- Laboratories, Nanjing, China. His research interests
tion for in-vehicle can bus using binary sequence whitelisting,” Comput. include the safety and security of connected
Secur., vol. 134, Nov. 2023, Art. no. 103436. automated vehicles, and differential privacy.
[41] A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly Mr. Liu received the Outstanding Graduate of Zhejiang Province in 2020
detection for the automotive can bus,” in Proc. World Congr. Ind. Control and the Outstanding Graduate Doctorate in Shanghai in 2024. He serves as a
Syst. Security, 2015, pp. 45–49. reviewer for several journals, including IEEE Vehicular Technology Magazine
[42] H. M. Song, H. R. Kim, and H. K. Kim, “Intrusion detection system and Expert Systems With Applications.
based on the analysis of time intervals of can messages for in-vehicle
network,” in Proc. Int. Conf. Inf. Netw. (ICOIN), 2016, pp. 63–68.
[43] A. R. Javed, S. Ur Rehman, M. U. Khan, M. Alazab, and T. Reddy,
“CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller
area network using CNN and attention-based GRU,” IEEE Trans. Netw.
Sci. Eng., vol. 8, no. 2, pp. 1456–1466, Apr.–Jun. 2021.
[44] E. Seo, H. M. Song, and H. K. Kim, “GIDS: GAN based intrusion
detection system for in-vehicle network,” in Proc. 16th Annu. Conf. Priv.,
Security Trust (PST), 2018, pp. 1–6.
Xingyu Li is currently pursuing the B.S. degree with
[45] T. He, L. Zhang, F. Kong, and A. Salekin, “Exploring inherent sensor
the School of Computer Engineering and Science,
redundancy for automotive anomaly detection,” in Proc. 57th ACM/IEEE
Shanghai University, Shanghai, China.
Design Autom. Conf. (DAC), 2020, pp. 1–6.
His research interests cover the security of con-
[46] L. Xue et al., “SAID: State-aware defense against injection attacks
nected automated vehicles and statistical methods,
on in-vehicle network,” in Proc. 31st USENIX Secur. Symp., 2022,
including the Hawkes process.
pp. 1921–1938.
[47] (AUTOSAR Found., Munich, Germany). AUTOSAR Software
Specification: Diagnostic Event Manager. 2020. [Online].
Available: https://www.autosar.org/fileadmin/standards/R20-
11/CP/AUTOSAR_SWS_DiagnosticEventManager.pdf
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SISSA: REAL-TIME MONITORING OF HARDWARE FUNCTIONAL SAFETY AND CYBERSECURITY 27339
Ke Sun (Member, IEEE) received the M.Sc. degree Yanchen Liu currently pursuing the B.S. degree in
from Tongji University, Shanghai, China, and the school of computer engineering and science from
University of Bologna, Bologna, Italy, in 2015, and Shanghai University, Shanghai, China, engaged in
the Ph.D. degree from the University of Sheffield, CV and ML research.
Sheffield, U.K., in 2020. He is adept at designing and implementing deep-
He is currently a Lecturer with the School learning models, operating and maintaining HPC
of Computer Engineering and Science, Shanghai clusters, optimizing complex computing tasks, and
University, Shanghai. Prior to that, he was a performance tuning.
Postdoctoral Researcher with the INRIA Centre,
Université Côte d’Azur, INRIA, Sophia Antipolis,
France, in 2022, and a Postdoctoral Research
Associate with the University of Sheffield from 2019 to 2021. His research
interests include the cybersecurity of cyber–physical systems.
Dr. Sun is the recipient of the 2023 Shanghai Overseas Talents Program, the
2020 ACSE Prize, and the Honorable Mention Award within the Engineering
Science Category in the 2020 Doctoral Research Award. He serves as a
TPC Member for IEEE SmartGridComm 2023 & 2024, and as a reviewer
for several journals and conferences, including IET Smart Grid, IEEE
I NTERNET OF T HINGS J OURNAL, IEEE T RANSACTIONS ON I NDUSTRIAL
I NFORMATICS, and IET Cyber-Physical Systems: Theory & Applications.
Authorized licensed use limited to: University of Michigan Library. Downloaded on February 03,2025 at 01:05:12 UTC from IEEE Xplore. Restrictions apply.