Automated CAN Message Translator

Abstract

One commonality among most vehicular security attacks reported to date is that they ultimately require write access to the CAN bus. In order to cause targeted and intentional changes in the vehicle behavior, malicious CAN injection attacks require knowledge of the CAN message format. However, since this format is proprietary to OEMs and can differ even among different models of a single make of vehicle, one must manually reverse-engineer the CAN message format of each vehicle they target. To mitigate this difficulty, an automated CAN message translator is presented.

Mert D. Pesé
Mert D. Pesé
Assistant Professor

My research interests include all sorts of automotive-related security and privacy, including on in-vehicle networks, connected car protocols, Android Automotive and adversarial machine learning against autonomous vehicles.