DEF CON 26 CAR HACKING VILLAGE - Ben - CANT

TRn_Rz2JIYQ/default.jpg

The Controller Area Network (CAN) bus has been mandated in all cars sold in the United States since 2008. But CAN is terrible in many unique and disturbing ways. CAN has served as a convenient punching bag for automotive security researches for a plethora of reasons, but all of the available analysis tools share a shortcoming. They invariably use a microcontroller with a built-in CAN peripheral that automatically takes care of the low-level (ISO layer 1 and 2) communication details, and ensures that the CAN peripheral plays nicely and behaves at those low levels. However, a good hardware hacker understands that the sole purpose of the electron is to be bent to our will, and breaking assumptions by making "That CANT happen!" happen is a surefire way to find bugs. CANT is a (partial) CAN bus peripheral implemented in software that allows security researchers to exercise the electrical bus-level error handling capability of CAN devices. The ability to selectively attack specific ECUs in a manner that is not detectable by automotive IDS/IPS systems (see ICS-ALERT-17-209-01) is invaluable to automotive security researchers as more automakers integrate advanced security measures into their vehicles.

TRn_Rz2JIYQ/default.jpg
DEF CON 26 CAR HACKING VILLAGE - Ben - CANT DEF CON 26 CAR HACKING VILLAGE - Ben - CANT Reviewed by Dump3R H3id3gg3R on October 31, 2018 Rating: 5