A Data-Driven Minimal Approach for CAN Bus Reverse Engineering


Current in-vehicle communication systems lack security features, such as encryption and secure authentication. The approach most commonly used by car manufacturers is to achieve security through obscurity – keep the proprietary format used to encode the information secret. However, it is still possible to decode this information via reverse engineering. Existing reverse engineering methods typically require physical access to the vehicle and are time consuming. In this paper, we present a Machine Learning-based method that performs automated Controller Area Network (CAN) bus reverse engineering while requiring minimal time, hardware equipment, and potentially no physical access to the vehicle. Our results demonstrate high accuracy in identifying critical vehicle functions just from analysing raw traces of CAN data.

3rd IEEE Connected and Automated Vehicles Symposium (CAVS)
Ion Turcanu
Ion Turcanu
Research and Technology Associate

My research interests include communications protocols for multi-technology vehicular networks, time-sensitive networking for in-vehicle communications, and next-generation cellular networks.