Skip to main content

Enhancing CAN Security: A Fourier Transform Approach to Reverse Engineering

  • Conference paper
  • First Online:
Advances in Intelligent Networking and Collaborative Systems (INCoS 2024)

Abstract

Modern vehicles are increasingly equipped with numerous electronic hardware devices, evolving into Connected and Autonomous Vehicles (CAVs). These devices, known as Electronic Control Units (ECUs), communicate via the Controller Area Network (CAN) protocol, a de-facto standard for inter-ECU communication. The relationships between CAN messages and vehicle functions are stored in CAN database (DBC) files, which are proprietary and typically withheld by Original Equipment Manufacturers (OEMs) for security reasons. Despite its reliability and cost-effectiveness, the CAN protocol’s broadcast nature makes it vulnerable to attackers who gain network access. Current defense solutions, such as Intrusion Detection Systems (IDS), are developed independently of DBC information, resulting in discrepancies between research threats and real-world vehicle threats. To address this, CAN message time difference calculation reversal methods can be employed, though time domain calculations often suffer from noise interference. This paper proposes a novel reverse engineering approach using Fourier Transform to perform calculations in the frequency domain, offering a more accurate analysis of CAN messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim, M., Oh, I., Yim, K., Sahlabadi, M., Shukur, Z.: Security of 6G-enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies. IEEE Access 12, 33972–34001 (2024)

    Article  Google Scholar 

  2. Islam, M.R., Sahlabadi, M., Kim, K., Kim, Y., Yim, K.: CF-AIDS: comprehensive frequency-agnostic intrusion detection system on in-vehicle network. IEEE Access 12, 13971–13985 (2024)

    Article  Google Scholar 

  3. Sahlabadi, M., Muniyandi, R.C., Shukur, Z., Islam, M.R., SaberiKamarposhti, M., Yim, K.: LPMSAEF: lightweight process mining-based software architecture evaluation framework for security and performance analysis. Heliyon 10, e26969 (2024)

    Article  Google Scholar 

  4. Oladimeji, D., Rasheed, A., Varol, C., Baza, M., Alshahrani, H., Baz, A.: CANAttack: assessing vulnerabilities within controller area network. Sensors 23(19), 8223 (2023)

    Article  Google Scholar 

  5. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. BlackHat USA, vol. 2015, no. S91 (2015)

    Google Scholar 

  6. Yusupov, K., Islam, M.R., Oh, I., Sahlabadi, M., Yim, K.: Security assessment of in-vehicle network intrusion detection in real-life scenarios. In: Wyld, D.C., Nagamalai, N. (eds.) Proceedings of 12th International Conference Security, Privacy and Trust Management (SPTM 2024), Computer Science & Information Technology (CS & IT), vol. 14, no. 11, pp. xxx–xxx (2024)

    Google Scholar 

  7. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 447–462 (2010)

    Google Scholar 

  8. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses ofautomotive attack surfaces. In: Proceedings of USENIX Security Symposium, San Francisco, CA, USA, vol. 4, p. 2021 (2011)

    Google Scholar 

  9. Al-Jarrah, O.Y., Maple, C., Dianati, M., Oxtoby, D., Mouzakitis, A.: Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7, 21266–21289 (2019). https://doi.org/10.1109/ACCESS.2019.2894183

    Article  Google Scholar 

  10. Buscemi, A., Turcanu, I., Castignani, G., Panchenko, A., Engel, T., Shin, K.G.: A survey on controller area network reverse engineering. IEEE Commun. Surv. Tutor. 25(3), 1445–1481 (2023). https://doi.org/10.1109/COMST.2023.3264928

    Article  Google Scholar 

  11. Bi, Z., Guosheng, X., Wang, C., Zhang, G.X.S.: A method for translating automotive body-related CAN messages based on labeled bits. Appl. Sci. 13(3), 1–7 (2023)

    Article  Google Scholar 

  12. Osgood, P.B.: The Fourier Transform and its Applications. Electrical Engineering Department, Stanford University

    Google Scholar 

  13. Batzorig, M., Yim, K., Koh, Y., Ali, E., Nyamdelger, T.: Fuzz Testing and Safe Framework Development for Vehicle Security Analysis (2023)

    Google Scholar 

  14. Werquin, T.: Automated Reverse Engineering and Fuzzing of the Can Bus. KU Leuven, Leuven (2019)

    Google Scholar 

  15. Do, D.H.: Automated Tool for CAN Bus Message Mapping. Faculty of Information Technology, Czech Technical University in Prague, Prague (2019)

    Google Scholar 

  16. Ricaud, B., Borgnat, P., Tremblay, N., Gonçalves, P., Vandergheynst, P.: Fourier could be a data scientist: from graph Fourier transform to signal processing on graphs. C. R. Phys. 20, 474–488 (2019)

    Article  Google Scholar 

  17. Marchetti, M., Stabili, D.: READ: reverse engineering of automotive data frames. IEEE Trans. Inf. Forensics Secur. 14(4), 1083–1097 (2019). https://doi.org/10.1109/TIFS.2018.2870826

    Article  Google Scholar 

  18. Young, C., Olufowobi, H., Bloom, G., Zambreno, J.: Automotive intrusion detection based on constant CAN message frequencies across vehicle driving modes. In: Proceedings of the 2019 ACM Workshop on Automotive Cybersecurity (AutoSec ‘19), Richardson, TX, USA, Mar. 27, pp. 1–6 (2019). https://doi.org/10.1145/3309171.3309179

Download references

Acknowledgements

This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2022-0-01197, Convergence security core talent training business (SoonChunHyang University)).

I would like to extend my deepest gratitude to the Lab of Information Security Assurance (LISA) at Soonchunhyang University for their invaluable guidance and support throughout the course of this research. My sincere thanks go to the Professor Kangbin Yim for providing the necessary resources and facilities, which were instrumental in the successful completion of this project. Their expertise, encouragement, and unwavering assistance have been crucial in shaping the direction of my work. I am truly grateful for the opportunity to be part of such a distinguished research environment.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chatchawan Tangcharoen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tangcharoen, C., Batzorig, M., Sahlabadi, M., Prasomphan, S., Yim, K. (2024). Enhancing CAN Security: A Fourier Transform Approach to Reverse Engineering. In: Barolli, L. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-031-72322-3_12

Download citation

Publish with us

Policies and ethics