Automotive security is a field of rising importance worldwide. Vehicles are becoming smarter than ever, equipped with processors, sensors, and new communication technologies to improve road safety and consumer comfort. Despite hosting a myriad of different technologies, the most fundamental factor differentiating automotive security from any other security discipline is its use of In-Vehicle Networks (IVN) – the nervous system of a car.
Expanding on the introductory CAN course presented at last year’s conference, this lab hopes to introduce practical applications of open-source CAN bus software tools for vehicle security research.
Attendees will be introduced to different types of attacks possible on a CAN bus, what tools can be used to perform them, and what impact they can have on a vehicle. Techniques for advanced reverse engineering and isolation of desired CAN signals will also be covered, equipping the audience with techniques to start car hacking on their own.
In addition to the different types of attacks on a CAN bus, we will also cover some the diagnostics functionalities in vehicles such as Unified Diagnostics Systems (UDS). This portion will include an introduction to automotive diagnostics, as well as hands-on lessons with open-source diagnostic training software that the audience can follow along to.
Open-source tools and hardware that is readily available to the participants are used to emphasize accessibility to the techniques taught in this course.