Abstract
Modern vehicles are increasingly equipped with numerous electronic hardware devices, evolving into Connected and Autonomous Vehicles (CAVs). These devices, known as Electronic Control Units (ECUs), communicate via the Controller Area Network (CAN) protocol, a de-facto standard for inter-ECU communication. The relationships between CAN messages and vehicle functions are stored in CAN database (DBC) files, which are proprietary and typically withheld by Original Equipment Manufacturers (OEMs) for security reasons. Despite its reliability and cost-effectiveness, the CAN protocol’s broadcast nature makes it vulnerable to attackers who gain network access. Current defense solutions, such as Intrusion Detection Systems (IDS), are developed independently of DBC information, resulting in discrepancies between research threats and real-world vehicle threats. To address this, CAN message time difference calculation reversal methods can be employed, though time domain calculations often suffer from noise interference. This paper proposes a novel reverse engineering approach using Fourier Transform to perform calculations in the frequency domain, offering a more accurate analysis of CAN messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kim, M., Oh, I., Yim, K., Sahlabadi, M., Shukur, Z.: Security of 6G-enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies. IEEE Access 12, 33972–34001 (2024)
Islam, M.R., Sahlabadi, M., Kim, K., Kim, Y., Yim, K.: CF-AIDS: comprehensive frequency-agnostic intrusion detection system on in-vehicle network. IEEE Access 12, 13971–13985 (2024)
Sahlabadi, M., Muniyandi, R.C., Shukur, Z., Islam, M.R., SaberiKamarposhti, M., Yim, K.: LPMSAEF: lightweight process mining-based software architecture evaluation framework for security and performance analysis. Heliyon 10, e26969 (2024)
Oladimeji, D., Rasheed, A., Varol, C., Baza, M., Alshahrani, H., Baz, A.: CANAttack: assessing vulnerabilities within controller area network. Sensors 23(19), 8223 (2023)
Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. BlackHat USA, vol. 2015, no. S91 (2015)
Yusupov, K., Islam, M.R., Oh, I., Sahlabadi, M., Yim, K.: Security assessment of in-vehicle network intrusion detection in real-life scenarios. In: Wyld, D.C., Nagamalai, N. (eds.) Proceedings of 12th International Conference Security, Privacy and Trust Management (SPTM 2024), Computer Science & Information Technology (CS & IT), vol. 14, no. 11, pp. xxx–xxx (2024)
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 447–462 (2010)
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses ofautomotive attack surfaces. In: Proceedings of USENIX Security Symposium, San Francisco, CA, USA, vol. 4, p. 2021 (2011)
Al-Jarrah, O.Y., Maple, C., Dianati, M., Oxtoby, D., Mouzakitis, A.: Intrusion detection systems for intra-vehicle networks: a review. IEEE Access 7, 21266–21289 (2019). https://doi.org/10.1109/ACCESS.2019.2894183
Buscemi, A., Turcanu, I., Castignani, G., Panchenko, A., Engel, T., Shin, K.G.: A survey on controller area network reverse engineering. IEEE Commun. Surv. Tutor. 25(3), 1445–1481 (2023). https://doi.org/10.1109/COMST.2023.3264928
Bi, Z., Guosheng, X., Wang, C., Zhang, G.X.S.: A method for translating automotive body-related CAN messages based on labeled bits. Appl. Sci. 13(3), 1–7 (2023)
Osgood, P.B.: The Fourier Transform and its Applications. Electrical Engineering Department, Stanford University
Batzorig, M., Yim, K., Koh, Y., Ali, E., Nyamdelger, T.: Fuzz Testing and Safe Framework Development for Vehicle Security Analysis (2023)
Werquin, T.: Automated Reverse Engineering and Fuzzing of the Can Bus. KU Leuven, Leuven (2019)
Do, D.H.: Automated Tool for CAN Bus Message Mapping. Faculty of Information Technology, Czech Technical University in Prague, Prague (2019)
Ricaud, B., Borgnat, P., Tremblay, N., Gonçalves, P., Vandergheynst, P.: Fourier could be a data scientist: from graph Fourier transform to signal processing on graphs. C. R. Phys. 20, 474–488 (2019)
Marchetti, M., Stabili, D.: READ: reverse engineering of automotive data frames. IEEE Trans. Inf. Forensics Secur. 14(4), 1083–1097 (2019). https://doi.org/10.1109/TIFS.2018.2870826
Young, C., Olufowobi, H., Bloom, G., Zambreno, J.: Automotive intrusion detection based on constant CAN message frequencies across vehicle driving modes. In: Proceedings of the 2019 ACM Workshop on Automotive Cybersecurity (AutoSec ‘19), Richardson, TX, USA, Mar. 27, pp. 1–6 (2019). https://doi.org/10.1145/3309171.3309179
Acknowledgements
This work was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2022-0-01197, Convergence security core talent training business (SoonChunHyang University)).
I would like to extend my deepest gratitude to the Lab of Information Security Assurance (LISA) at Soonchunhyang University for their invaluable guidance and support throughout the course of this research. My sincere thanks go to the Professor Kangbin Yim for providing the necessary resources and facilities, which were instrumental in the successful completion of this project. Their expertise, encouragement, and unwavering assistance have been crucial in shaping the direction of my work. I am truly grateful for the opportunity to be part of such a distinguished research environment.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tangcharoen, C., Batzorig, M., Sahlabadi, M., Prasomphan, S., Yim, K. (2024). Enhancing CAN Security: A Fourier Transform Approach to Reverse Engineering. In: Barolli, L. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-031-72322-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-72322-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-72321-6
Online ISBN: 978-3-031-72322-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)