I. Introduction
Automobiles have evolved from purely mechanical devices to connected computing platforms. Historically the computers in cars were isolated from the outside world, and the security of those systems was not of concern. But in recent years it has become clear that this is no longer the case; hackers have demonstrated that cars are vulnerable to cyber attacks. Such attacks work by leveraging weaknesses in the Electronic Control Units (ECUs) that control the vehicle. The ECUs communicate using the Controller Area Network (CAN) bus standard. In order to control the car, hackers typically gain access through an external interface such as cellular, bluetooth, or devices plugged into the onboard diagnostic port [1], [2]. Once they have gained a foothold, they find a way to transmit packets on the CAN bus crafted to cause specific effects. ECUs will in most cases accept properly formatted packets without authentication, making it is relatively easy to control the vehicle [3], [4]. However, any attack will modify the CAN bus traffic, and such modifications can be detected.