US 12,335,732 B2
Detecting spoofed ethernet frames within an autosar communication stack
Mohamed A. Layouni, Fraser, MI (US); Vinaya Rayapeta, Cedar Park, TX (US); Manohar Reddy Nanjundappa, Troy, MI (US); Thomas M. Forest, Macomb, MI (US); and Karl Bernard Leboeuf, LaSalle (CA)
Assigned to GM GLOBAL TECHNOLOGY OPERATIONS LLC, Detroit, MI (US)
Filed by GM Global Technology Operations LLC, Detroit, MI (US)
Filed on Jun. 29, 2022, as Appl. No. 17/852,715.
Prior Publication US 2024/0007859 A1, Jan. 4, 2024
Int. Cl. H04W 12/106 (2021.01); G07C 5/00 (2006.01); H04W 12/104 (2021.01)
CPC H04W 12/106 (2021.01) [G07C 5/008 (2013.01); H04W 12/104 (2021.01)] 14 Claims
OG exemplary drawing
 
8. A method comprising:
receiving, at a device driver, an Ethernet frame from an Automotive Open System Architecture (AUTOSAR) communication stack;
determining, at the device driver, whether the Ethernet frame is a spoofed Ethernet frame by:
extracting, via the device driver, a source media access control MAC) address from a source MAC address portion of the Ethernet frame;
extracting, via the device driver, the source MAC address from a datagram portion of the Ethernet frame; and
comparing the source MAC address extracted from the source MAC address portion with the source MAC address extracted from the datagram portion,
wherein the ethernet frame is spoofed when the source MAC address extracted from the source MAC address portion does not match the source MAC address extracted from the datagram portion; and
transmitting a cancelation command to at least one layer of the AUTOSAR communication stack when the device driver determines the Ethernet frame is spoofed.