Vehicle Electronic Security and "Hacking" Your Car
|
|
- Cori Rodgers
- 6 years ago
- Views:
Transcription
1 Vehicle Electronic Security and "Hacking" Your Car Jeremy Daily, Ph.D., P.E. Associate Professor of Mechanical Engineering James Johnson Ph.D. Candidate in Computer Science Andrew Kongs Undergraduate in Electrical Engineering
2 Overview Introduction How we got involved in vehicle electronics through crash testing What is Hacking? What does Cyber Security mean to Automotive systems? Technology Overview Controller Area Network (CAN) fundamentals Connecting Hardware to the Network Reverse Engineering Signals Automotive Security Testing and Vulnerabilities Literature Review Security Analysis Tools (Fuzzing, Debugging, etc) Digital Forensics for Automotive Systems Sensor Simulators Chip Level Examination
3 The University of Tulsa Private co-ed doctoral university with about 4500 students. TU is in the top 100 among national doctoral universities Institutions for information security designated by the NSA as one of its Centers of Academic Excellence in Information Assurance Education. Many privately funded research consortia
4 Crash testing around the country Leverage on-board sensors for data acquisition CAN bus monitoring 8 SAE Publications Videos on website: 4
5 What is a Hacker? A technically inclined person who is really curious about how things work but don t have the manual (or don t use it) Most engineer s are hackers to some extent. Hacker + complicated kids toy = dad at Christmas Hacker + patent attorney = inventor Hacker + business opportunity = entrepreneur Hacker + university = researcher Hacker + prankster = drain on society Hacker + evil empire = national security threat Outcome depends on the context of the Hack and the ethics of the hacker
6 Hacking Cars Tuners and Street Racers Event Data Recorders Third party EDR testing and verification CAN Data Interpretation Decoding library is proprietary Things Unpleasant Stealing Cars Breaking and Entering Or worse
7
8 8
9 Consequences of Unpleasant Hacks Public paranoia has commercial implications Customers may start pushing for improved security Attribution is difficult We don t know who the perpetrator is. Consequences can be scary Unintended Accelerations Loss of brakes Pulling the steering wheel Remote interfaces eliminate the need for physical access.
10 Why Cars are Hackable? Its the Network! Introduction to Automotive Networks Measurement and Control Systems System Models Sensing and Converting Controller Area Network Basics Standards and Protocols J1939, J1708, J1587 Demonstrations
11 Purpose of Measurement and Control Enable optimal operation across broader ranges Fuel map changes with altitudes Enable compliance with stricter environmental regulations Improve economy and performance Increase longevity and enable machine condition monitoring Enable data logging for warranty disputes Provide fleet management tools and safety monitoring
12 Sensing and Control Functional Block Diagram Data Logger Sensor Signal Conditioner Transmitter Controller CAN Bus Plant (Process) Actuator 12
13 Converting Analog to Digital Considerations Rate, Range and Resolution Signal Sampling (Rate) Converts a continuous signal into a discrete signal Frequency? Range Amplify or attenuate signal to match A/D converter electronics Example: Voltmeters don t operate at 120 V Quantization (Resolution) Converts a discrete signal into a digital word Quantizing bits, N Number of combinations: 2 N 12 bit = 2 12 = bit = 2 16 = Least Significant Bit Value = Full Scale Range / 2 N 13
14 Digital Concepts Binary: Represented by ones and zeros (bits) Native computer language Cumbersome and long Hexadecimal: 0-F 16 values 4 binary bits (nibble) 2 hex values = 8 bits = 1 byte (256 values) Quantizing Table decimal = binary = D9 hex 14
15 Standards and Protocols Since computers speak binary, we need conversions ASCII: American Standard Code for Information Interchange SAE Standards for Heavy Trucks J1939 (many parts) J1708 J1587 ISO11992 Standards compliant vehicles contain common elements Useful for Horizontal Integration 15
16 CAN Basics Controller Area Network (CAN) serial bus introduced by Bosch in mid 1980s A 2-wire bus with multi-master capability with Collision Detection, Arbitration, and Error Checking Result: nearly 100% data integrity in harsh environments Implemented using CAN transceiver hardware Inexpensive Single quantity prices around $4.00 with big benefits in economies of scale jeremy-daily@utulsa.edu
17 Controller Area Networks Bosch CAN Specification is free online. SAE J1939: Recommended Practice for a Serial Control and Communications Vehicle Network J2284: High Speed CAN (HSC) for Vehicle Applications at 250 Kbps J2411: Single Wire CAN Network for Vehicle Applications 17
18 Physical Transmission Media Up to 40 meters of twisted pair with 120 ohm terminating resistors. Linear bus with 1m stubs CAN is resilient; deviations may not affect performance. CAN Bus
19 Physical Transmission Media
20 Connector Standards (9-Pin) Pin A: Battery (-) Pin B: Battery (+) Pin C: CAN High Pin D: CAN Low Pin E: CAN Shield Pin F: J1708 (+) Pin G: J1708 (-) Pin H: OEM Use or 2 nd CAN High Pin J: OEM Use or 2 nd CAN Low Source: J jeremy-daily@utulsa.edu
21 Except Caterpillar Pin A: Battery (+) Pin B: Battery (-) Pin C: CAN Shield Pin D: CAT Data Link Hi Pin E: CAT Data Link Lo Pin F: CAN/J1939 Lo Pin G: CAN/J1939 Hi Pin H: J1708 Lo Pin J: J1708 Hi Source: DG Technologies ( 17 January 2
22 Message Structure 29-bit Identifier (Arbitration) Control Field Data Field Error Checking Data typically transferred up to 8 bytes at a time jeremy-daily@utulsa.edu
23 CAN Collisions and Arbitration Problem: All have access to the bus at the same time Multiple devices try to send data at once Solution: CAN Arbitration where the highest Priority message comes through Others wait and retry Arbitration Message Identifier (MID) determines priority 0 is dominant, so lowest MID wins jeremy-daily@utulsa.edu
24 Extended CAN Format for J1939 SOF = Start of Frame EDP = Extended Data Page DP = Data Page PDU = Protocol Data Unit PF = PDU Format PG = Parameter Group SRR = Substitute Remote Request IDE = Identifier Extension Bit RTR = Remote transmission request jeremy-daily@utulsa.edu
25 29-bit Identifier Example Some messages have higher priority over others.
26 11-bit Identifiers Light vehicles typically use Standard CAN 500 kbps (250kpbs for J1939 on heavy trucks) Also known as Class C, or High Speed CAN Example: 2010 Dodge Ram 17 January 2
27 17 January 2
28 17 January 2
29 Observations Logic Levels 0 Volts = Binary 1 1 Volt = Binary 0 (Dominant Bit) Bit Stuffing Oscilloscope shows Binary 0 s for decoded FF Used to ensure timing Taken care of with hardware Starting procedure shows many more messages when engine is running Two traces: High Speed CAN and Comfort CAN jeremy-daily@utulsa.edu 17 January 2
30 Wiring Schematic Obtained from: 17 January 3
31 Wireless Control Module: What does that do? 17 January 3
32 Crash Testing 17 January 3
33 Crash Testing 17 January 3
34 Mini Cooper GPS Speed 17 January 3
35 8 April
36 Vehicle Speed (MPH) Plot Combinations of Bytes 0x153 Byte 2 CAN Message Time (sec) jeremy-daily@utulsa.edu 17 January 3
37 Mini Cooper CAN IDs 17 January 3
38 Reverse Engineering 17 January 3
39 Synchronizing CAN and Crash 17 January 3
40 Cadillac vs. Tractor Trailer 17 January 4
41 Event Data Recorder Accuracy 17 January 4
42 EDR Rig Testing 17 January 4
43 Truck-In-A-Box and Chip-Level Forensics
44 Truck-In-A-Box Our Truck-In-A-Box was designed to simulate a vehicle for an ECM, including active and passive sensors Funded by DARPA through the Cyber Fast Track Program Our first TIB simulated a vehicle for a Navistar MaxxForce 13 ECM Included Instrument Cluster, ECM and simulated ABS Computer Science /
45
46 Active Signal Simulation Characterized real vehicle sensor signals Created programs to generate the signals Feed the signals to the ECM in the Truck-In-A-Box Recorded data during driving tests in real vehicles, played back data to the ECM using a Truck-In-A-Box Also replayed J1939 traffic from the drive tests
47
48
49
50 What is it for? Very Flexible Testing and research framework for heavy vehicle ECMs Forensic Recovery of Functional ECM Data Security and Pen Testing for Vehicle Networks Can be used to simulate driving sequences, set hard brake events on some ECMs (Key-on Engine-Off has limitations) Much lower acquisition cost than an actual vehicle
51 More Trucks-in-Boxes Since the first one (which got shipped away to DARPA), we ve build boxes for about 10 different ECMs Includes Detroit Diesel, Caterpillar, Cummins, Navistar Simplest one is the DDEC IV, most complicated so far is Navistar Complexity largely depends on the ECM and what it requires
52 What happens when an ECM is damaged in a crash, but may contain valuable data?
53 Chip Level Forensics Follow on project to Truck-In-A-Box through DARPA s Cyber Fast Track program Researching ways to recover data from the ECM directly, not over the vehicle network Use Trucks-in-boxes to simulate driving sequences with ECMs, tear down the ECM, remove the chips, read the data Ongoing project
54
55
56
57
58 Challenges All of the ECMs have environmental protection conformal coatings and sealants Seems as if none of them were designed to be taken apart, much less have things recovered from them after broken Getting inside the case is a big challenge BGA chips and Data interpretation are also difficult
59 Goals Tear down ECMs, survey the device internals in the industry Develop techniques for investigators to open the devices Map and Identify information within the raw data Investigate the possibilities of tampering with data
60 Future Work Expand the breadth to encompass more devices and models Add more features and improve the accuracy of the TIB s simulated sensors and networks Vulnerability analysis of extracted code running on devices Improvements to the forensic extraction techniques
61 How I Learned to Quit Worrying and Love Hackers 61
62 Car Hacking Is Hot Experimental Security Analysis of a Modern Automobile Koscher et al Comprehensive Security Analyses of Automotive Attack Surfaces Checkoway et al Adventures in Automotive Networks and Control Units Miller & Valasek
63 2010 A shot across the bow Researchers fuzzed an automotive network Locked doors, perma-on, disabled brakes Also did some scary visual effects
64 2011 Twisting the knife More complete exploration of attack surfaces Compromise through service tools, music player, Bluetooth, Cellular Unauthenticated remote exploits of automobiles
65 2011 Twisting the knife More complete exploration of attack surfaces Compromise through service tools, music player, Bluetooth, Cellular Unauthenticated remote exploits of automobiles Translation: This Is Really Bad
66 2013 Charlie Miller Covered attacks possible with network access Attacked Prius and Ford Escape Controlled brakes, acceleration, and steering Also reverse engineered OEM maintenance software Obtained passwords, etc.
67 67
68 FUD: Fear, Uncertainty, and Doubt All this has upset the automotive industry and everyone else We can t think like the hackers Need to demystify hackers and hacking
69 Hackers Origin Story MIT TMRC, late 60s A person who delights in having an intimate understanding of the internal workings of a system RFC 1392 Playful cleverness Current usage stems from too much playfulness
70 Tools of the Trade Black Box Testing Fuzzing Fault injection testing Dynamic Analysis Static Analysis
71 Black Box Testing Zero knowledge of system internals Inject input Random Semi-random Replay Observe results This can best be explained by an example
72 Tools: BeagleBone Black, CANCape Total cost ~$100 Inject random traffic using custom Python script Time invested: ~1/2 hour Preliminary testing resulted in only slight damage to vehicle 72
73 Dynamic Analysis Observe system in running state Partial knowledge of system Software tools Debuggers Sysinternals Developer tools Another brief example: a truck maintenance software file format.
74 74
75 75
76 Static Analysis Detailed analysis of static code Most complete, safest Also incredibly time consuming Tools of the trade Disassemblers Decompilers Yet another example involving truck maintenance software encryption
77 77
78 Current Trends Vehicles continue to get more networked
79 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact.
80 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR
81 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR OEMs are beginning to take this seriously
82 Current Trends Vehicles continue to get more networked What about heavy trucks? Bigger attack surface, more impact. Significant academic interest in vehicle security Telematics interfaces Smart grid to vehicle communications Example: ESCAR OEMs are beginning to take this seriously SAE J3061 is on the way!
Assessing the Accuracy of Vehicle Event Data based on CAN Messages
Assessing the Accuracy of Vehicle Event Data based on CAN Messages Carsten Mueller Ph.D. Candidate in Computer Science Jeremy Daily Associate Professor (Select) of Mechanical Engineering Mauricio Papa
More informationHow to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles
How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Who is this guy? Jason Staggs Graduate Research Assistant Institute for Information Security (isec)
More informationAn Experimental Analysis of the SAE J1939 Standard
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard 10th USENIX Workshop On Offensive Technologies (WOOT 16) Liza Burakova, Bill Hass, Leif Millar & Andre Weimerskirch Are trucks more secure
More informationSAE J1939. Serial Control and Communications Vehicle Network
SAE J1939 Serial Control and Communications Vehicle Network Literature Literature on Controller Area Network, CANopen and SAE J1939 Page 2 What is SAE J1939 General Aspects Higher-layer protocol based
More informationJ1939 OVERVIEW. 1
1 www.kvaser.com Table of Contents J1939: Introduction...2 Introduction... 2 Quick facts... 2 The SAE J1939 standards... 2 J1939: In Depth...4 Message Format and Usage (J1939/21)... 4 Addresses and Names
More informationMaking it easy to obtain digital forensic data from heavy vehicle crashes.
1 Making it easy to obtain digital forensic data from heavy vehicle crashes. 2 Using and Understanding the Smart Sensor Simulator 2 3 Understanding the Need for the SSS2: Connecting to Electronic Control
More informationSAE J1939. Serial Control and Communications Vehicle Network. Presented by Wilfried Voss
SAE J1939 Serial Control and Communications Vehicle Network Presented by Wilfried Voss Copperhill Technologies Corp. Greenfield, MA 01301 https://copperhilltech.com Literature Literature on Controller
More informationExperimental Security Analysis of a Modern Automobile
Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper
More informationSecurity Analysis of modern Automobile
Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces
More informationSecurity Concerns in Automotive Systems. James Martin
Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background
More informationCar Hacking for Ethical Hackers
Car Hacking for Ethical Hackers Dr. Bryson Payne, GPEN, CEH, CISSP UNG Center for Cyber Operations (CAE-CD) 2016-2021 Languages Leadership Cyber Why Car Hacking? Internet-connected and self-driving cars
More informationDevelopment of Intrusion Detection System for vehicle CAN bus cyber security
Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia
More informationin London (United Kingdom) Sponsored by Motorola Semiconductor National Semiconductor Philips Semiconductors Organized by
2 nd international CAN Conference icc 995 in London (United Kingdom) Sponsored by Motorola Semiconductor National Semiconductor Philips Semiconductors Organized by CAN in Automation (CiA) international
More informationCAN bus and NMEA2000 1
NMEA2000 relation to CAN and how Warwick Control can help Richard McLaughlin B.Sc., M.Sc., CEng Dr Chris Quigley Warwick Control NMEA Conference 2016, Naples, Florida CAN bus and NMEA2000 1 Company Profile
More informationVEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.
VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware ABOUT
More informationController area network
Controller area network From Wikipedia, the free encyclopedia (Redirected from Controller area network) Controller area network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers
More informationUNDERSTANDING THE CONTROLLER AREA NETWORK (CAN)
UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) The unsuspecting troops had come under heavy enemy fire just before dawn and the garrison was caught totally by surprise. The fort commander had been awakened
More informationCommunication Networks for the Next-Generation Vehicles
Communication Networks for the, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 (313) 577-3855, smahmud@eng.wayne.edu January 13, 2005 4 th Annual Winter Workshop U.S.
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 11783-3 Second edition 2007-10-01 Tractors and machinery for agriculture and forestry Serial control and communications data network Part 3: Data link layer Tracteurs et matériels
More informationController Area Network Global Positioning System Receiver and Real Time Clock. Copyright EVTV LLC EVTV CAN-GPS 3.01
EVTV CAN-GPS Controller Area Network Global Positioning System Receiver and Real Time Clock Copyright 2015 - EVTV LLC EVTV CAN-GPS 3.01 DECEMBER 2017 1 INTRODUCTION The EVTV Controller Area Network Global
More informationCONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976
More information(Controller Area Network)
CAN (Controller Area Network) CAN is open technology supporting multiple applications Chips available today from Intel, Motorola, Philips/Signetics, NEC, Hitachi, Siemens Volumes from multiple industry
More informationFast and Vulnerable A Story of Telematic Failures
Fast and Vulnerable A Story of Telematic Failures Center for Automotive Embedded Systems Security Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Telematic Control Units Connects to car s
More informationJ1939-based application profiles
J1939-based application profiles Holger Zeltwanger J1939 reference model 7 6 Application Profile Presentation 5 4 Session Transport 3 etwork J1939/31 - Truck and Bus etwork Layer 2 Data Link J1939/21 -
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationWho is riding the Bus?
1 of 5 12/17/2005 9:55 AM Who is riding the Bus? Let's look into the mysterious world of body and chassis controllers and the way they communicate with each other. In this article we will look at the different
More informationThe House Intelligent Switch Control Network based On CAN bus
The House Intelligent Switch Control Network based On CAN bus A.S.Jagadish Department Electronics and Telecommunication Engineering, Bharath University Abstract The Embedded Technology is now in its prime
More informationISO INTERNATIONAL STANDARD
INTENATIONAL STANDAD ISO 11783-3 First edition 1998-07-01 Tractors and machinery for agriculture and forestry Serial control and communications data network Part 3: Data link layer Tracteurs et machines
More informationOvervoltage protection with PROTEK TVS diodes in automotive electronics
Ian Doyle Protek / Zoltán Kiss Endrich Bauelemente Vertriebs GmbH Overvoltage protection with PROTEK TVS diodes in automotive electronics A utomotive electronics is maybe the area of the automotive industry,
More informationAutomobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched
Automobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched communication protocol used for automotive industries. Now we are
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationDigital communication technology for teaching automatic control: the level control case
Digital communication technology for teaching automatic control: the level control case Nicolás H. Beltrán, Manuel A. Duarte-Mermoud and Pablo A. Kremer Department of Electrical Engineering, University
More informationAutomotive Attack Surfaces. UCSD and University of Washington
Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationSingle device test requirements for reliable CAN-Based multi-vendor networks
Single device test requirements for reliable CAN-Based multi-vendor networks Peter P. Dierauer By building a system with an open device-level network, the system designer has the option to choose devices
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationHandling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016
Handling Top Security Threats for Connected Embedded Devices OpenIoT Summit, San Diego, 2016 Jeep Cherokee hacked in July 2015 Presented at Black Hat USA 2015 Charlie Miller Chris Valasek Remote exploit
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationReal-Time Communications. LS 12, TU Dortmund
Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.
More informationUART Thou Mad? An Introduction to the UART Hardware Interface. Mickey Shkatov. Toby Kohlenberg
UART Thou Mad? An Introduction to the UART Hardware Interface Mickey Shkatov Toby Kohlenberg 1 Table of Contents Abstract... 2 Introduction to UART... 2 Essential Tools... 4 UART and Security... 5 Conclusion...
More informationThe case for a Vehicle Gateway.
The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol
More informationHeavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.
Heavy Vehicle Cybersecurity Update National Motor Freight Traffic Association, Inc. National Motor Freight Traffic Association, Inc. (NMFTA) Industry non-profit representing more than 600 companies operating
More informationCONTROLLER AREA NETWORK (CAN) DEEP PACKET INSPECTION. Görkem Batmaz, Systems Engineer Ildikó Pete, Systems Engineer 28 th March, 2018
CONTROLLER AREA NETWORK (CAN) DEEP PACKET INSPECTION Görkem Batmaz, Systems Engineer Ildikó Pete, Systems Engineer 28 th March, 2018 Car Hacking Immediately my accelerator stopped working. As I frantically
More informationLinux in the connected car platform
Linux in the connected car platform Background Long time desktop Linux user Designed several capes for the BeagleBone Black Currently an Embedded engineer for Dialexa What is a connected car anyway? A
More informationApplication. Diagnosing the dashboard by the CANcheck software. Introduction
Diagnosing the dashboard by the CANcheck software Introduction In recent years, vehicle electronics technology improved and advances day by day. A great of advanced electronic technology has been applied
More informationController Area Networks
Controller Area Networks Contents CAN Overview PG 44 ISO Box and 9-pin Diagnostic PG 45 J1939/11 Schematics PG 46 J1939/15 Schematics PG 47 43 CAN Overview Controller Area Networks, or CAN are multiplex
More informationThe Internet of Things. Steven M. Bellovin November 24,
The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)
More informationModern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego
Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,
More informationDesign of the Control System about Central Signals in Electric Vehicle
J. Electromagnetic Analysis & Applications, 2010, 2: 189-194 doi:10.4236/jemaa.2010.23027 Published Online March 2010 (http://www.scirp.org/journal/jemaa) 1 Design of the Control System about Central Signals
More informationProvide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any
OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing
More informationDeviceNet - CIP on CAN Technology
The CIP Advantage Technology Overview Series DeviceNet - CIP on CAN Technology DeviceNet has been solving manufacturing automation applications since the mid-1990's, and today boasts an installed base
More informationAdversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov
Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives
More informationElectrification of Mobility
Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems
More informationWorkshop on In Vehicle Network using CAN By
Workshop on In Vehicle Network using CAN By Modern CAR Modern CAR INTRODUCTION 1. Controller Area Network (CAN) was initially created by German automotive system supplier Robert Bosch in the mid-1980s.
More informationController Area Network
Controller Area Network 1 CAN FUNDAMENTALS...3 1.1 USER BENEFITS...3 1.1.1 CAN is low cost...3 1.1.2 CAN is reliable...3 1.1.3 CAN means real-time...3 1.1.4 CAN is flexible...3 1.1.5 CAN means Multicast
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationTwo Module Development Kit Installation and User Instructions For Model No. ED-GV15/30
Two Module Development Kit Installation and User Instructions For Model No. ED-GV15/30 This Kit is designed to be used as a development platform; performance, regulatory or safety testing for commercial
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationISSN:
1424 NETWORKING IN AUTOMOBILE USING CAN PROTOCOL R.SIVA BABU 1, V.NARASIMHA RAO 2 1 R.Siva Babu, M.TECH, Embedded systems, Gudlavalleru engineering college, 2 Sri.V.Narasimha Rao, Assistant Professor,
More informationA Beginner s Guide to Controller Area Network Bus Access in Modern Vehicles
Kennesaw State University From the SelectedWorks of Kevin McFall November 15, 2016 A Beginner s Guide to Controller Area Network Bus Access in Modern Vehicles Kevin McFall, Kennesaw State University T.
More informationCAN Based Data Acquisition
Introduction This project will convert physical temperature measurements into Controller Area Network (CAN) messages following the Society of Automotive Engineers standard, SAE-J1939, Surface Vehicle Recommended
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationCyber Security in the Maritime Sector Threats, Trends and Reality
Cyber Security in the Maritime Sector Threats, Trends and Reality FUD *Fear, Uncertainty, Doubt 1st ever Maritime Cyber Security Incident was documented thoroughly in 1997 A computer hacker breaks into
More informationUniversity of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban
University of Tartu Research Seminar in Cryptography Car Security Author: Tiina Turban Supervisor: Dominique Unruh December 16, 2013 1 Introduction Cars these days are becoming more and more computerized.
More informationModular and Scalable Power Converters in the UPS Industry
A-PDF Split DEMO : Purchase from www.a-pdf.com to remove the watermark Modular and Scalable Power Converters in the Industry Ian Wallace Eaton Corporation, Innovation Center 1 Eaton Overview Eaton Electric
More informationAdvanced Transportation Optimization Systems (ATOS)
Advanced Transportation Optimization Systems (ATOS) By Andrew Andrusko Undergraduate Student Student in Civil Engineering, Urban & Regional Studies, Social Studies, Geography, Geology Programs Minnesota
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationTechnical Manual Series M3658, M3678
Absolute Singleturnn Encoder Series M3658, M3678 Fritz Kübler GmbH Copyright Protection The contents of this documentation are protected by copyright Fritz Kübler GmbH. The contents of this documentation
More informationA modern diagnostic approach for automobile systems condition monitoring
A modern diagnostic approach for automobile systems condition monitoring M Selig 1,2, Z Shi 3, A Ball 1 and K Schmidt 2 1 University of Huddersfield, School of Computing and Engineering, Queensgate, Huddersfield
More informationDigital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationDearborn Protocol Adapter 5(DPA5) -Dual CAN, BlueTooth Wireless, RP1210 A/B Compliant
Dearborn Protocol Adapter 5(DPA5) -Dual CAN, BlueTooth Wireless, RP1210 A/B Compliant Part No: MPDG-CAN-DPA5 The DPA 5 continues the Dearborn Group DPA family tradition of being the fastest, most rugged,
More informatione-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text In this module, microcontrollers and embedded processors
More informationImplementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application
Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Pallavi Pandurang Jadhav 1, Prof. S.N.Kore 2 1Department Of Electronics Engineering, Walchand College Of Engineering,
More informationCAN protocol enhancement
Protocols CAN protocol enhancement This article describes the enhanced CAN protocol called CAN-HG and the features of the IC circuitry from Canis that implement it. CAN-HG has been designed to meet two
More informationSYNCHRONOUS MULTIMEDIA AND VEHICLE DATA
ViCANdo is an easy to use ADAS systems test and simulation environment that includes Ethernet, FlexRay, CAN, LIN, MOST as communication busses, as well as Video and sound analysis built for daily use for
More informationSerial Buses in Industrial and Automotive Applications
Serial Buses in Industrial and Automotive Applications Presented by Neelima Chaurasia Class: #368 1 Overview As consumer electronics, computer peripherals, vehicles and industrial applications add embedded
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationIS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION
SESSION ID: SBX3-W1 IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION Jeffrey Quesnelle Director of Software Development Intrepid Control Systems @IntrepidControl Introduction Spent 15 years working
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationPreventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationVehicle Network Gateway (VNG)
Vehicle Network Gateway (VNG) (With emphasis on the j1850 interface) Fetah Basic (Spencer Volmar and Marc Oliver Co-Workers) Abstract The Vehicle Network Gateway or VNG (pronounced ving ) is a small embedded
More information4.0 PHYSICAL CONNECTIONS
TABLE OF CONTENTS 1.0 INTRODUCTION 2 2.0 FRAMING 3 3.0 MESSAGES 5 4.0 PHYSICAL CONNECTIONS 18 5.0 SPECIFICATIONS 19 VNA-Mini Converter - 1 - Chapter 1 Introduction Chapter 1 Introduction VNA-Mini is a
More informationIPTM Special Problems 2013 Crash Test Data. IPTM's Special Problems
IPTM Special Problems 2013 Crash Test Data IPTM's Special Problems 2013 http://tucrrc.utulsa.edu 1 Introduction and Overview Jeremy Daily, Ph.D., P.E. Associate Professor of Mechanical Engineering Director
More informationPhysical Tamper Resistance
Physical Tamper Resistance (Ross Anderson s book Security Engineering - Chapter 16) Tamper: VERB (tamper with) Interfere with (something) in order to cause damage or make unauthorized alterations. someone
More informationSecuring the Autonomous Automobile
Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights
More informationCANalyzer.J1939. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Application Areas... 3 1.2 Features and Advantages... 3 1.3 Further Information... 3 2 Functions... 4 3 Hardware Interfaces... 4 4 Transport
More informationA Framework Of Milk Dairy Automation Using CAN Protocol
Reviewed Paper Volume 2 Issue 7 March 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 A Framework Of Milk Dairy Automation Using CAN Protocol Paper ID IJIFR/ V2/
More informationOMNICOMM ON-BOARD TERMINALS
ON-BOARD TERMINALS QUALITY, RELIABILITY, PRECISION On-board terminals are a critical component of effective fleet management. They collect data from various sensors and the vehicle s on-board computer
More informationUsing CAN Arbitration for Electrical Layer Testing
Using CAN Arbitration for Electrical Layer Testing Sam Broyles and Steve Corrigan, Texas Instruments, Inc. The Controller Area Network (CAN) protocol incorporates a powerful means of seamlessly preventing
More informationChances and challenges
Chances and challenges CAN FD for commercial vehicles Holger Zeltwanger Commercial vehicles CAN in mobile machinery Truck network architecture Trunk, fuel Switches CAN (FD) Instrumentation train (125 or
More informationPreventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI
Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges
More informationBUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS
BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet
More informationHardening Attack Vectors to cars by Fuzzing
Hardening Attack Vectors to cars by Fuzzing AESIN 2015 Ashley Benn, Regional Sales manager 29 th October, 2015 2015 Synopsys, Inc. 1 Today, there are more than 100m lines of code in cars 2015 Synopsys,
More informationManufacturing in the More-than-Moore era
Manufacturing in the More-than-Moore era Rutger Wijburg SVP NXP Semiconductors 5 th SEMI Brussels Forum 24 May, 2011 NXP Semiconductors is an HPMS leader NXP Semiconductors N.V. (NASDAQ: NXPI) provides
More informationThrough the years we ve come
A Closer Look at Vehicle Data Communications A Closer Look at Vehicle Data Communications by Steve Garrett members.atra.com Through the years we ve come to depend on the information we can collect with
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationOperating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien
Operating Systems, Concurrency and Time real-time communication and CAN Johan Lukkien (Courtesy: Damir Isovic, Reinder Bril) Question Which requirements to communication arise from real-time systems? How
More information