Open search

CAN Newsletter magazine

Classical CAN/CAN FD security threats

The authors of this article already have introduced various technical solutions for distinct security threats. This time, they want to take a step back to look at the bigger picture of CAN security.

“We must work under the assumption that an attacker with unlimited physical access might be able to extract private keys stored in the devices,” stated Olaf Pfeiffer and Christian Keydel (Source: Adobe Stock)

The complete article is published in the December issue of the CAN Newsletter magazine 2019. This is just an excerpt.

“The bad news is that no matter what we do to add security to a CAN system,” state the authors of this article, “there will be always some cases left that cannot be protected with reasonable effort.” .. “The good news is that with a combination of Stinger (special transceiver chip by NXP), CANcrypt, and DTLS technologies you can still effectively protect your system from many attack vectors.”

The different attack vectors are categorized and discussed. They include vandalism, bypass limitations, unauthorized data collection, stealing intellectual property, unauthorized remote control, and extrusion, sabotage as well as ransomware. The article also provides possible protection options.

If you want to continue reading this article, you can download the PDF. Or you download the full magazine. This is free-of-charge.


Publish date