CyberCAN

CAN is an excellent technology for control system integration.  However, it was never designed with protection against cyberattacks in mind.

Attacks could include:

  • Spoofing of a device or ECU
  • Man-In-The-Middle
  • Denial of Service – e.g. taking the communications of an ECU down

 

Attack examples include:

  • AdBlue ECU cheat– pretending AdBlue tank is full to prevent going into limp-home mode
  • Accident data manipulation
  • Tachograph cheating
  • Making control system dangerous by malicious attack
  • Manipulation of Battery Management System data
  • Reverse engineering of the CAN bus

 

Warwick Control has developed a patented technology that can be used to fingerprint a CAN network based on the CAN bus electrical voltages e.g. on CAN_H and CAN_L lines.  The broad principle has been demonstrated by Warwick Control in the papers referenced below.

It can be used in applications such Intrusion Detection Systems (IDS).  It works by fingerprinting the CAN bus network upon an installation phase for the CAN system.  The IDS is installed on the CAN bus, a fingerprint learning phase is carried and then the device is ready to run on the live network.

Once running on a live CAN bus, messages from different ECUs or devices can be monitored to carry out:

  • Fingerprinting of raw data for each device on the network.
  • Classify devices as an intruder or not.

Consider the following example for a NMEA 2000 network.  Left: CAN ID 19F2150B is fingerprinted and found to be correctly transmitted by a device with source address 0x0B.  Right: CAN ID 19F2150C should be transmitted by a device with source address 0x0C but has incorrectly been transmitted by a device with source address 0x0B.  This suggests that one of the devices has been hacked/compromised.

Good Operation
Suspicious Operation

A nice side feature of the technology is the ability to also carry out diagnostics on the electrical signal of CAN messages from particular ECUs or devices such as:

  • Low or high CAN differential
  • CAN_L shorted to ground fault
  • Noisy or CAN signals with a high-level of variation

 

The technology is available for licensing.  The following are available to purchase from Warwick Control:

  • IDS ECU or PCB with which to evaluate the technology.
  • PC software

 

If you are interested in more information, please contact sales@warwickcontrol.com

 

References

  1. Quigley, D. Charles, R. McLaughlin (2018); “Reverse engineering of CAN communication”, CAN Newsletter 4/2018, CAN in Automation. https://can-newsletter.org/engineering/engineering-miscellaneous/181123_reverse-engineering-of-can-communication_warwick
  2. Quigley, D. Charles, R. McLaughlin (2019); “CAN Bus Message Electrical Signatures for Automotive Reverse Engineering, Bench Marking and Rogue ECU Detection”, SAE paper 2019-01-0476.
  3. Quigley, D. Charles, R. McLaughlin (2020); “Benchmarking of CAN Systems Using the Physical Layer- Car, Truck and Marine Case Studies”, International CAN Conference (online).
  4. https://www.kvaser.com/use-can-bus-message-electrical-signatures-automotive-reverse-engineering/