CAN Newsletter magazine
The authors of this article already have introduced various technical solutions for distinct security threats. This time, they want to take a step back to look at the bigger picture of CAN security.
The complete article is published in the December issue of the CAN Newsletter magazine 2019. This is just an excerpt.
“The bad news is that no matter what we do to add security to a CAN system,” state the authors of this article, “there will be always some cases left that cannot be protected with reasonable effort.” .. “The good news is that with a combination of Stinger (special transceiver chip by NXP), CANcrypt, and DTLS technologies you can still effectively protect your system from many attack vectors.”
The different attack vectors are categorized and discussed. They include vandalism, bypass limitations, unauthorized data collection, stealing intellectual property, unauthorized remote control, and extrusion, sabotage as well as ransomware. The article also provides possible protection options.
News and reports