Vehicle Electronic Security and "Hacking" Your Car

Size: px
Start display at page:

Download "Vehicle Electronic Security and "Hacking" Your Car"

Transcription

1 Vehicle Electronic Security and "Hacking" Your Car Jeremy Daily, Ph.D., P.E. Associate Professor of Mechanical Engineering James Johnson Ph.D. Candidate in Computer Science Andrew Kongs Undergraduate in Electrical Engineering

2 Overview Introduction How we got involved in vehicle electronics through crash testing What is Hacking? What does Cyber Security mean to Automotive systems? Technology Overview Controller Area Network (CAN) fundamentals Connecting Hardware to the Network Reverse Engineering Signals Automotive Security Testing and Vulnerabilities Literature Review Security Analysis Tools (Fuzzing, Debugging, etc) Digital Forensics for Automotive Systems Sensor Simulators Chip Level Examination

3 The University of Tulsa Private co-ed doctoral university with about 4500 students. TU is in the top 100 among national doctoral universities Institutions for information security designated by the NSA as one of its Centers of Academic Excellence in Information Assurance Education. Many privately funded research consortia

4 Crash testing around the country Leverage on-board sensors for data acquisition CAN bus monitoring 8 SAE Publications Videos on website: 4

5 What is a Hacker? A technically inclined person who is really curious about how things work but don t have the manual (or don t use it) Most engineer s are hackers to some extent. Hacker + complicated kids toy = dad at Christmas Hacker + patent attorney = inventor Hacker + business opportunity = entrepreneur Hacker + university = researcher Hacker + prankster = drain on society Hacker + evil empire = national security threat Outcome depends on the context of the Hack and the ethics of the hacker

6 Hacking Cars Tuners and Street Racers Event Data Recorders Third party EDR testing and verification CAN Data Interpretation Decoding library is proprietary Things Unpleasant Stealing Cars Breaking and Entering Or worse

7

8 8

9 Consequences of Unpleasant Hacks Public paranoia has commercial implications Customers may start pushing for improved security Attribution is difficult We don t know who the perpetrator is. Consequences can be scary Unintended Accelerations Loss of brakes Pulling the steering wheel Remote interfaces eliminate the need for physical access.

10 Why Cars are Hackable? Its the Network! Introduction to Automotive Networks Measurement and Control Systems System Models Sensing and Converting Controller Area Network Basics Standards and Protocols J1939, J1708, J1587 Demonstrations

11 Purpose of Measurement and Control Enable optimal operation across broader ranges Fuel map changes with altitudes Enable compliance with stricter environmental regulations Improve economy and performance Increase longevity and enable machine condition monitoring Enable data logging for warranty disputes Provide fleet management tools and safety monitoring

12 Sensing and Control Functional Block Diagram Data Logger Sensor Signal Conditioner Transmitter Controller CAN Bus Plant (Process) Actuator 12

13 Converting Analog to Digital Considerations Rate, Range and Resolution Signal Sampling (Rate) Converts a continuous signal into a discrete signal Frequency? Range Amplify or attenuate signal to match A/D converter electronics Example: Voltmeters don t operate at 120 V Quantization (Resolution) Converts a discrete signal into a digital word Quantizing bits, N Number of combinations: 2 N 12 bit = 2 12 = bit = 2 16 = Least Significant Bit Value = Full Scale Range / 2 N 13

14 Digital Concepts Binary: Represented by ones and zeros (bits) Native computer language Cumbersome and long Hexadecimal: 0-F 16 values 4 binary bits (nibble) 2 hex values = 8 bits = 1 byte (256 values) Quantizing Table decimal = binary = D9 hex 14

15 Standards and Protocols Since computers speak binary, we need conversions ASCII: American Standard Code for Information Interchange SAE Standards for Heavy Trucks J1939 (many parts) J1708 J1587 ISO11992 Standards compliant vehicles contain common elements Useful for Horizontal Integration 15

16 CAN Basics Controller Area Network (CAN) serial bus introduced by Bosch in mid 1980s A 2-wire bus with multi-master capability with Collision Detection, Arbitration, and Error Checking Result: nearly 100% data integrity in harsh environments Implemented using CAN transceiver hardware Inexpensive Single quantity prices around $4.00 with big benefits in economies of scale jeremy-daily@utulsa.edu

17 Controller Area Networks Bosch CAN Specification is free online. SAE J1939: Recommended Practice for a Serial Control and Communications Vehicle Network J2284: High Speed CAN (HSC) for Vehicle Applications at 250 Kbps J2411: Single Wire CAN Network for Vehicle Applications 17

18 Physical Transmission Media Up to 40 meters of twisted pair with 120 ohm terminating resistors. Linear bus with 1m stubs CAN is resilient; deviations may not affect performance. CAN Bus

19 Physical Transmission Media

20 Connector Standards (9-Pin) Pin A: Battery (-) Pin B: Battery (+) Pin C: CAN High Pin D: CAN Low Pin E: CAN Shield Pin F: J1708 (+) Pin G: J1708 (-) Pin H: OEM Use or 2 nd CAN High Pin J: OEM Use or 2 nd CAN Low Source: J jeremy-daily@utulsa.edu

21 Except Caterpillar Pin A: Battery (+) Pin B: Battery (-) Pin C: CAN Shield Pin D: CAT Data Link Hi Pin E: CAT Data Link Lo Pin F: CAN/J1939 Lo Pin G: CAN/J1939 Hi Pin H: J1708 Lo Pin J: J1708 Hi Source: DG Technologies ( 17 January 2

22 Message Structure 29-bit Identifier (Arbitration) Control Field Data Field Error Checking Data typically transferred up to 8 bytes at a time jeremy-daily@utulsa.edu

23 CAN Collisions and Arbitration Problem: All have access to the bus at the same time Multiple devices try to send data at once Solution: CAN Arbitration where the highest Priority message comes through Others wait and retry Arbitration Message Identifier (MID) determines priority 0 is dominant, so lowest MID wins jeremy-daily@utulsa.edu

24 Extended CAN Format for J1939 SOF = Start of Frame EDP = Extended Data Page DP = Data Page PDU = Protocol Data Unit PF = PDU Format PG = Parameter Group SRR = Substitute Remote Request IDE = Identifier Extension Bit RTR = Remote transmission request jeremy-daily@utulsa.edu

25 29-bit Identifier Example Some messages have higher priority over others.

26 11-bit Identifiers Light vehicles typically use Standard CAN 500 kbps (250kpbs for J1939 on heavy trucks) Also known as Class C, or High Speed CAN Example: 2010 Dodge Ram 17 January 2

27 17 January 2

28 17 January 2

29 Observations Logic Levels 0 Volts = Binary 1 1 Volt = Binary 0 (Dominant Bit) Bit Stuffing Oscilloscope shows Binary 0 s for decoded FF Used to ensure timing Taken care of with hardware Starting procedure shows many more messages when engine is running Two traces: High Speed CAN and Comfort CAN jeremy-daily@utulsa.edu 17 January 2

30 Wiring Schematic Obtained from: 17 January 3

31 Wireless Control Module: What does that do? 17 January 3

32 Crash Testing 17 January 3

33 Crash Testing 17 January 3

34 Mini Cooper GPS Speed 17 January 3

35 8 April

36 Vehicle Speed (MPH) Plot Combinations of Bytes 0x153 Byte 2 CAN Message Time (sec) jeremy-daily@utulsa.edu 17 January 3

37 Mini Cooper CAN IDs 17 January 3

38 Reverse Engineering 17 January 3

39 Synchronizing CAN and Crash 17 January 3

40 Cadillac vs. Tractor Trailer 17 January 4

41 Event Data Recorder Accuracy 17 January 4

42 EDR Rig Testing 17 January 4

43 Truck-In-A-Box and Chip-Level Forensics

44 Truck-In-A-Box Our Truck-In-A-Box was designed to simulate a vehicle for an ECM, including active and passive sensors Funded by DARPA through the Cyber Fast Track Program Our first TIB simulated a vehicle for a Navistar MaxxForce 13 ECM Included Instrument Cluster, ECM and simulated ABS Computer Science /

45

46 Active Signal Simulation Characterized real vehicle sensor signals Created programs to generate the signals Feed the signals to the ECM in the Truck-In-A-Box Recorded data during driving tests in real vehicles, played back data to the ECM using a Truck-In-A-Box Also replayed J1939 traffic from the drive tests

47

48

49

50 What is it for? Very Flexible Testing and research framework for heavy vehicle ECMs Forensic Recovery of Functional ECM Data Security and Pen Testing for Vehicle Networks Can be used to simulate driving sequences, set hard brake events on some ECMs (Key-on Engine-Off has limitations) Much lower acquisition cost than an actual vehicle

51 More Trucks-in-Boxes Since the first one (which got shipped away to DARPA), we ve build boxes for about 10 different ECMs Includes Detroit Diesel, Caterpillar, Cummins, Navistar Simplest one is the DDEC IV, most complicated so far is Navistar Complexity largely depends on the ECM and what it requires

52 What happens when an ECM is damaged in a crash, but may contain valuable data?

53 Chip Level Forensics Follow on project to Truck-In-A-Box through DARPA s Cyber Fast Track program Researching ways to recover data from the ECM directly, not over the vehicle network Use Trucks-in-boxes to simulate driving sequences with ECMs, tear down the ECM, remove the chips, read the data Ongoing project

54

55

56

57

58 Challenges All of the ECMs have environmental protection conformal coatings and sealants Seems as if none of them were designed to be taken apart, much less have things recovered from them after broken Getting inside the case is a big challenge BGA chips and Data interpretation are also difficult

59 Goals Tear down ECMs, survey the device internals in the industry Develop techniques for investigators to open the devices Map and Identify information within the raw data Investigate the possibilities of tampering with data

60 Future Work Expand the breadth to encompass more devices and models Add more features and improve the accuracy of the TIB s simulated sensors and networks Vulnerability analysis of extracted code running on devices Improvements to the forensic extraction techniques

61 How I Learned to Quit Worrying and Love Hackers 61

62 Car Hacking Is Hot Experimental Security Analysis of a Modern Automobile Koscher et al Comprehensive Security Analyses of Automotive Attack Surfaces Checkoway et al Adventures in Automotive Networks and Control Units Miller & Valasek

63 2010 A shot across the bow Researchers fuzzed an automotive network Locked doors, perma-on, disabled brakes Also did some scary visual effects

64 2011 Twisting the knife More complete exploration of attack surfaces Compromise through service tools, music player, Bluetooth, Cellular Unauthenticated remote exploits of automobiles

65 2011 Twisting the knife More complete exploration of attack surfaces Compromise through service tools, music player, Bluetooth, Cellular Unauthenticated remote exploits of automobiles Translation: This Is Really Bad

66 2013 Charlie Miller Covered attacks possible with network access Attacked Prius and Ford Escape Controlled brakes, acceleration, and steering Also reverse engineered OEM maintenance software Obtained passwords, etc.

67 67

68 FUD: Fear, Uncertainty, and Doubt All this has upset the automotive industry and everyone else We can t think like the hackers Need to demystify hackers and hacking

69 Hackers Origin Story MIT TMRC, late 60s A person who delights in having an intimate understanding of the internal workings of a system RFC 1392 Playful cleverness Current usage stems from too much playfulness

70 Tools of the Trade Black Box Testing Fuzzing Fault injection testing Dynamic Analysis Static Analysis

71 Black Box Testing Zero knowledge of system internals Inject input Random Semi-random Replay Observe results This can best be explained by an example

72 Tools: BeagleBone Black, CANCape Total cost ~$100 Inject random traffic using custom Python script Time invested: ~1/2 hour Preliminary testing resulted in only slight damage to vehicle 72

73 Dynamic Analysis Observe system in running state Partial knowledge of system Software tools Debuggers Sysinternals Developer tools Another brief example: a truck maintenance software file format.

74 74

75 75

76 Static Analysis Detailed analysis of static code Most complete, safest Also incredibly time consuming Tools of the trade Disassemblers Decompilers Yet another example involving truck maintenance software encryption

77 77

78 Current Trends Vehicles continue to get more networked

79 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact.

80 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR

81 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR OEMs are beginning to take this seriously

82 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR OEMs are beginning to take this seriously SAE J3061 is on the way!

Assessing the Accuracy of Vehicle Event Data based on CAN Messages

Assessing the Accuracy of Vehicle Event Data based on CAN Messages Assessing the Accuracy of Vehicle Event Data based on CAN Messages Carsten Mueller Ph.D. Candidate in Computer Science Jeremy Daily Associate Professor (Select) of Mechanical Engineering Mauricio Papa

More information

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Who is this guy? Jason Staggs Graduate Research Assistant Institute for Information Security (isec)

More information

An Experimental Analysis of the SAE J1939 Standard

An Experimental Analysis of the SAE J1939 Standard Truck Hacking: An Experimental Analysis of the SAE J1939 Standard 10th USENIX Workshop On Offensive Technologies (WOOT 16) Liza Burakova, Bill Hass, Leif Millar & Andre Weimerskirch Are trucks more secure

More information

SAE J1939. Serial Control and Communications Vehicle Network

SAE J1939. Serial Control and Communications Vehicle Network SAE J1939 Serial Control and Communications Vehicle Network Literature Literature on Controller Area Network, CANopen and SAE J1939 Page 2 What is SAE J1939 General Aspects Higher-layer protocol based

More information

J1939 OVERVIEW. 1

J1939 OVERVIEW. 1 1 www.kvaser.com Table of Contents J1939: Introduction...2 Introduction... 2 Quick facts... 2 The SAE J1939 standards... 2 J1939: In Depth...4 Message Format and Usage (J1939/21)... 4 Addresses and Names

More information

Making it easy to obtain digital forensic data from heavy vehicle crashes.

Making it easy to obtain digital forensic data from heavy vehicle crashes. 1 Making it easy to obtain digital forensic data from heavy vehicle crashes. 2 Using and Understanding the Smart Sensor Simulator 2 3 Understanding the Need for the SSS2: Connecting to Electronic Control

More information

SAE J1939. Serial Control and Communications Vehicle Network. Presented by Wilfried Voss

SAE J1939. Serial Control and Communications Vehicle Network. Presented by Wilfried Voss SAE J1939 Serial Control and Communications Vehicle Network Presented by Wilfried Voss Copperhill Technologies Corp. Greenfield, MA 01301 https://copperhilltech.com Literature Literature on Controller

More information

Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper

More information

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

Security Concerns in Automotive Systems. James Martin

Security Concerns in Automotive Systems. James Martin Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background

More information

Car Hacking for Ethical Hackers

Car Hacking for Ethical Hackers Car Hacking for Ethical Hackers Dr. Bryson Payne, GPEN, CEH, CISSP UNG Center for Cyber Operations (CAE-CD) 2016-2021 Languages Leadership Cyber Why Car Hacking? Internet-connected and self-driving cars

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

in London (United Kingdom) Sponsored by Motorola Semiconductor National Semiconductor Philips Semiconductors Organized by

in London (United Kingdom) Sponsored by Motorola Semiconductor National Semiconductor Philips Semiconductors Organized by 2 nd international CAN Conference icc 995 in London (United Kingdom) Sponsored by Motorola Semiconductor National Semiconductor Philips Semiconductors Organized by CAN in Automation (CiA) international

More information

CAN bus and NMEA2000 1

CAN bus and NMEA2000 1 NMEA2000 relation to CAN and how Warwick Control can help Richard McLaughlin B.Sc., M.Sc., CEng Dr Chris Quigley Warwick Control NMEA Conference 2016, Naples, Florida CAN bus and NMEA2000 1 Company Profile

More information

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved. VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware ABOUT

More information

Controller area network

Controller area network Controller area network From Wikipedia, the free encyclopedia (Redirected from Controller area network) Controller area network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers

More information

UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN)

UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) The unsuspecting troops had come under heavy enemy fire just before dawn and the garrison was caught totally by surprise. The fort commander had been awakened

More information

Communication Networks for the Next-Generation Vehicles

Communication Networks for the Next-Generation Vehicles Communication Networks for the, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 (313) 577-3855, smahmud@eng.wayne.edu January 13, 2005 4 th Annual Winter Workshop U.S.

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 11783-3 Second edition 2007-10-01 Tractors and machinery for agriculture and forestry Serial control and communications data network Part 3: Data link layer Tracteurs et matériels

More information

Controller Area Network Global Positioning System Receiver and Real Time Clock. Copyright EVTV LLC EVTV CAN-GPS 3.01

Controller Area Network Global Positioning System Receiver and Real Time Clock. Copyright EVTV LLC EVTV CAN-GPS 3.01 EVTV CAN-GPS Controller Area Network Global Positioning System Receiver and Real Time Clock Copyright 2015 - EVTV LLC EVTV CAN-GPS 3.01 DECEMBER 2017 1 INTRODUCTION The EVTV Controller Area Network Global

More information

CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES

CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976

More information

(Controller Area Network)

(Controller Area Network) CAN (Controller Area Network) CAN is open technology supporting multiple applications Chips available today from Intel, Motorola, Philips/Signetics, NEC, Hitachi, Siemens Volumes from multiple industry

More information

Fast and Vulnerable A Story of Telematic Failures

Fast and Vulnerable A Story of Telematic Failures Fast and Vulnerable A Story of Telematic Failures Center for Automotive Embedded Systems Security Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Telematic Control Units Connects to car s

More information

J1939-based application profiles

J1939-based application profiles J1939-based application profiles Holger Zeltwanger J1939 reference model 7 6 Application Profile Presentation 5 4 Session Transport 3 etwork J1939/31 - Truck and Bus etwork Layer 2 Data Link J1939/21 -

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

Who is riding the Bus?

Who is riding the Bus? 1 of 5 12/17/2005 9:55 AM Who is riding the Bus? Let's look into the mysterious world of body and chassis controllers and the way they communicate with each other. In this article we will look at the different

More information

The House Intelligent Switch Control Network based On CAN bus

The House Intelligent Switch Control Network based On CAN bus The House Intelligent Switch Control Network based On CAN bus A.S.Jagadish Department Electronics and Telecommunication Engineering, Bharath University Abstract The Embedded Technology is now in its prime

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTENATIONAL STANDAD ISO 11783-3 First edition 1998-07-01 Tractors and machinery for agriculture and forestry Serial control and communications data network Part 3: Data link layer Tracteurs et machines

More information

Overvoltage protection with PROTEK TVS diodes in automotive electronics

Overvoltage protection with PROTEK TVS diodes in automotive electronics Ian Doyle Protek / Zoltán Kiss Endrich Bauelemente Vertriebs GmbH Overvoltage protection with PROTEK TVS diodes in automotive electronics A utomotive electronics is maybe the area of the automotive industry,

More information

Automobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched

Automobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched Automobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched communication protocol used for automotive industries. Now we are

More information

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN? Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today

More information

Digital communication technology for teaching automatic control: the level control case

Digital communication technology for teaching automatic control: the level control case Digital communication technology for teaching automatic control: the level control case Nicolás H. Beltrán, Manuel A. Duarte-Mermoud and Pablo A. Kremer Department of Electrical Engineering, University

More information

Automotive Attack Surfaces. UCSD and University of Washington

Automotive Attack Surfaces. UCSD and University of Washington Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Single device test requirements for reliable CAN-Based multi-vendor networks

Single device test requirements for reliable CAN-Based multi-vendor networks Single device test requirements for reliable CAN-Based multi-vendor networks Peter P. Dierauer By building a system with an open device-level network, the system designer has the option to choose devices

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

Handling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016

Handling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016 Handling Top Security Threats for Connected Embedded Devices OpenIoT Summit, San Diego, 2016 Jeep Cherokee hacked in July 2015 Presented at Black Hat USA 2015 Charlie Miller Chris Valasek Remote exploit

More information

Securing the Connected Car. Eystein Stenberg CTO Mender.io

Securing the Connected Car. Eystein Stenberg CTO Mender.io Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined

More information

Real-Time Communications. LS 12, TU Dortmund

Real-Time Communications. LS 12, TU Dortmund Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.

More information

UART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg

UART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg UART Thou Mad? An Introduction to the UART Hardware Interface Mickey Shkatov Toby Kohlenberg 1 Table of Contents Abstract... 2 Introduction to UART... 2 Essential Tools... 4 UART and Security... 5 Conclusion...

More information

The case for a Vehicle Gateway.

The case for a Vehicle Gateway. The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol

More information

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc. Heavy Vehicle Cybersecurity Update National Motor Freight Traffic Association, Inc. National Motor Freight Traffic Association, Inc. (NMFTA) Industry non-profit representing more than 600 companies operating

More information

CONTROLLER AREA NETWORK (CAN) DEEP PACKET INSPECTION. Görkem Batmaz, Systems Engineer Ildikó Pete, Systems Engineer 28 th March, 2018

CONTROLLER AREA NETWORK (CAN) DEEP PACKET INSPECTION. Görkem Batmaz, Systems Engineer Ildikó Pete, Systems Engineer 28 th March, 2018 CONTROLLER AREA NETWORK (CAN) DEEP PACKET INSPECTION Görkem Batmaz, Systems Engineer Ildikó Pete, Systems Engineer 28 th March, 2018 Car Hacking Immediately my accelerator stopped working. As I frantically

More information

Linux in the connected car platform

Linux in the connected car platform Linux in the connected car platform Background Long time desktop Linux user Designed several capes for the BeagleBone Black Currently an Embedded engineer for Dialexa What is a connected car anyway? A

More information

Application. Diagnosing the dashboard by the CANcheck software. Introduction

Application. Diagnosing the dashboard by the CANcheck software. Introduction Diagnosing the dashboard by the CANcheck software Introduction In recent years, vehicle electronics technology improved and advances day by day. A great of advanced electronic technology has been applied

More information

Controller Area Networks

Controller Area Networks Controller Area Networks Contents CAN Overview PG 44 ISO Box and 9-pin Diagnostic PG 45 J1939/11 Schematics PG 46 J1939/15 Schematics PG 47 43 CAN Overview Controller Area Networks, or CAN are multiplex

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Design of the Control System about Central Signals in Electric Vehicle

Design of the Control System about Central Signals in Electric Vehicle J. Electromagnetic Analysis & Applications, 2010, 2: 189-194 doi:10.4236/jemaa.2010.23027 Published Online March 2010 (http://www.scirp.org/journal/jemaa) 1 Design of the Control System about Central Signals

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

DeviceNet - CIP on CAN Technology

DeviceNet - CIP on CAN Technology The CIP Advantage Technology Overview Series DeviceNet - CIP on CAN Technology DeviceNet has been solving manufacturing automation applications since the mid-1990's, and today boasts an installed base

More information

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives

More information

Electrification of Mobility

Electrification of Mobility Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems

More information

Workshop on In Vehicle Network using CAN By

Workshop on In Vehicle Network using CAN By Workshop on In Vehicle Network using CAN By Modern CAR Modern CAR INTRODUCTION 1. Controller Area Network (CAN) was initially created by German automotive system supplier Robert Bosch in the mid-1980s.

More information

Controller Area Network

Controller Area Network Controller Area Network 1 CAN FUNDAMENTALS...3 1.1 USER BENEFITS...3 1.1.1 CAN is low cost...3 1.1.2 CAN is reliable...3 1.1.3 CAN means real-time...3 1.1.4 CAN is flexible...3 1.1.5 CAN means Multicast

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Two Module Development Kit Installation and User Instructions For Model No. ED-GV15/30

Two Module Development Kit Installation and User Instructions For Model No. ED-GV15/30 Two Module Development Kit Installation and User Instructions For Model No. ED-GV15/30 This Kit is designed to be used as a development platform; performance, regulatory or safety testing for commercial

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

ISSN:

ISSN: 1424 NETWORKING IN AUTOMOBILE USING CAN PROTOCOL R.SIVA BABU 1, V.NARASIMHA RAO 2 1 R.Siva Babu, M.TECH, Embedded systems, Gudlavalleru engineering college, 2 Sri.V.Narasimha Rao, Assistant Professor,

More information

A Beginner s Guide to Controller Area Network Bus Access in Modern Vehicles

A Beginner s Guide to Controller Area Network Bus Access in Modern Vehicles Kennesaw State University From the SelectedWorks of Kevin McFall November 15, 2016 A Beginner s Guide to Controller Area Network Bus Access in Modern Vehicles Kevin McFall, Kennesaw State University T.

More information

CAN Based Data Acquisition

CAN Based Data Acquisition Introduction This project will convert physical temperature measurements into Controller Area Network (CAN) messages following the Society of Automotive Engineers standard, SAE-J1939, Surface Vehicle Recommended

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Cyber Security in the Maritime Sector Threats, Trends and Reality

Cyber Security in the Maritime Sector Threats, Trends and Reality Cyber Security in the Maritime Sector Threats, Trends and Reality FUD *Fear, Uncertainty, Doubt 1st ever Maritime Cyber Security Incident was documented thoroughly in 1997 A computer hacker breaks into

More information

University of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban

University of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban University of Tartu Research Seminar in Cryptography Car Security Author: Tiina Turban Supervisor: Dominique Unruh December 16, 2013 1 Introduction Cars these days are becoming more and more computerized.

More information

Modular and Scalable Power Converters in the UPS Industry

Modular and Scalable Power Converters in the UPS Industry A-PDF Split DEMO : Purchase from www.a-pdf.com to remove the watermark Modular and Scalable Power Converters in the Industry Ian Wallace Eaton Corporation, Innovation Center 1 Eaton Overview Eaton Electric

More information

Advanced Transportation Optimization Systems (ATOS)

Advanced Transportation Optimization Systems (ATOS) Advanced Transportation Optimization Systems (ATOS) By Andrew Andrusko Undergraduate Student Student in Civil Engineering, Urban & Regional Studies, Social Studies, Geography, Geology Programs Minnesota

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Technical Manual Series M3658, M3678

Technical Manual Series M3658, M3678 Absolute Singleturnn Encoder Series M3658, M3678 Fritz Kübler GmbH Copyright Protection The contents of this documentation are protected by copyright Fritz Kübler GmbH. The contents of this documentation

More information

A modern diagnostic approach for automobile systems condition monitoring

A modern diagnostic approach for automobile systems condition monitoring A modern diagnostic approach for automobile systems condition monitoring M Selig 1,2, Z Shi 3, A Ball 1 and K Schmidt 2 1 University of Huddersfield, School of Computing and Engineering, Queensgate, Huddersfield

More information

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future

More information

Dearborn Protocol Adapter 5(DPA5) -Dual CAN, BlueTooth Wireless, RP1210 A/B Compliant

Dearborn Protocol Adapter 5(DPA5) -Dual CAN, BlueTooth Wireless, RP1210 A/B Compliant Dearborn Protocol Adapter 5(DPA5) -Dual CAN, BlueTooth Wireless, RP1210 A/B Compliant Part No: MPDG-CAN-DPA5 The DPA 5 continues the Dearborn Group DPA family tradition of being the fastest, most rugged,

More information

e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text

e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text In this module, microcontrollers and embedded processors

More information

Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application

Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Pallavi Pandurang Jadhav 1, Prof. S.N.Kore 2 1Department Of Electronics Engineering, Walchand College Of Engineering,

More information

CAN protocol enhancement

CAN protocol enhancement Protocols CAN protocol enhancement This article describes the enhanced CAN protocol called CAN-HG and the features of the IC circuitry from Canis that implement it. CAN-HG has been designed to meet two

More information

SYNCHRONOUS MULTIMEDIA AND VEHICLE DATA

SYNCHRONOUS MULTIMEDIA AND VEHICLE DATA ViCANdo is an easy to use ADAS systems test and simulation environment that includes Ethernet, FlexRay, CAN, LIN, MOST as communication busses, as well as Video and sound analysis built for daily use for

More information

Serial Buses in Industrial and Automotive Applications

Serial Buses in Industrial and Automotive Applications Serial Buses in Industrial and Automotive Applications Presented by Neelima Chaurasia Class: #368 1 Overview As consumer electronics, computer peripherals, vehicles and industrial applications add embedded

More information

ARM processors driving automotive innovation

ARM processors driving automotive innovation ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device

More information

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION SESSION ID: SBX3-W1 IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION Jeffrey Quesnelle Director of Software Development Intrepid Control Systems @IntrepidControl Introduction Spent 15 years working

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,

More information

Vehicle Network Gateway (VNG)

Vehicle Network Gateway (VNG) Vehicle Network Gateway (VNG) (With emphasis on the j1850 interface) Fetah Basic (Spencer Volmar and Marc Oliver Co-Workers) Abstract The Vehicle Network Gateway or VNG (pronounced ving ) is a small embedded

More information

4.0 PHYSICAL CONNECTIONS

4.0 PHYSICAL CONNECTIONS TABLE OF CONTENTS 1.0 INTRODUCTION 2 2.0 FRAMING 3 3.0 MESSAGES 5 4.0 PHYSICAL CONNECTIONS 18 5.0 SPECIFICATIONS 19 VNA-Mini Converter - 1 - Chapter 1 Introduction Chapter 1 Introduction VNA-Mini is a

More information

IPTM Special Problems 2013 Crash Test Data. IPTM's Special Problems

IPTM Special Problems 2013 Crash Test Data. IPTM's Special Problems IPTM Special Problems 2013 Crash Test Data IPTM's Special Problems 2013 http://tucrrc.utulsa.edu 1 Introduction and Overview Jeremy Daily, Ph.D., P.E. Associate Professor of Mechanical Engineering Director

More information

Physical Tamper Resistance

Physical Tamper Resistance Physical Tamper Resistance (Ross Anderson s book Security Engineering - Chapter 16) Tamper: VERB (tamper with) Interfere with (something) in order to cause damage or make unauthorized alterations. someone

More information

Securing the Autonomous Automobile

Securing the Autonomous Automobile Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights

More information

CANalyzer.J1939. Product Information

CANalyzer.J1939. Product Information Product Information Table of Contents 1 Introduction... 3 1.1 Application Areas... 3 1.2 Features and Advantages... 3 1.3 Further Information... 3 2 Functions... 4 3 Hardware Interfaces... 4 4 Transport

More information

A Framework Of Milk Dairy Automation Using CAN Protocol

A Framework Of Milk Dairy Automation Using CAN Protocol Reviewed Paper Volume 2 Issue 7 March 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 A Framework Of Milk Dairy Automation Using CAN Protocol Paper ID IJIFR/ V2/

More information

OMNICOMM ON-BOARD TERMINALS

OMNICOMM ON-BOARD TERMINALS ON-BOARD TERMINALS QUALITY, RELIABILITY, PRECISION On-board terminals are a critical component of effective fleet management. They collect data from various sensors and the vehicle s on-board computer

More information

Using CAN Arbitration for Electrical Layer Testing

Using CAN Arbitration for Electrical Layer Testing Using CAN Arbitration for Electrical Layer Testing Sam Broyles and Steve Corrigan, Texas Instruments, Inc. The Controller Area Network (CAN) protocol incorporates a powerful means of seamlessly preventing

More information

Chances and challenges

Chances and challenges Chances and challenges CAN FD for commercial vehicles Holger Zeltwanger Commercial vehicles CAN in mobile machinery Truck network architecture Trunk, fuel Switches CAN (FD) Instrumentation train (125 or

More information

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges

More information

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet

More information

Hardening Attack Vectors to cars by Fuzzing

Hardening Attack Vectors to cars by Fuzzing Hardening Attack Vectors to cars by Fuzzing AESIN 2015 Ashley Benn, Regional Sales manager 29 th October, 2015 2015 Synopsys, Inc. 1 Today, there are more than 100m lines of code in cars 2015 Synopsys,

More information

Manufacturing in the More-than-Moore era

Manufacturing in the More-than-Moore era Manufacturing in the More-than-Moore era Rutger Wijburg SVP NXP Semiconductors 5 th SEMI Brussels Forum 24 May, 2011 NXP Semiconductors is an HPMS leader NXP Semiconductors N.V. (NASDAQ: NXPI) provides

More information

Through the years we ve come

Through the years we ve come A Closer Look at Vehicle Data Communications A Closer Look at Vehicle Data Communications by Steve Garrett members.atra.com Through the years we ve come to depend on the information we can collect with

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien Operating Systems, Concurrency and Time real-time communication and CAN Johan Lukkien (Courtesy: Damir Isovic, Reinder Bril) Question Which requirements to communication arise from real-time systems? How

More information