Defending CAN bus Part 1: Attacks and intrusion detection

Поділитися
Вставка
  • Опубліковано 17 лис 2024

КОМЕНТАРІ • 6

  • @kentindell
    @kentindell  2 роки тому

    The hardware and tools used in this video are:
    CANPico board: www.skpang.co.uk/products/canpico-board?variant=39816530886851
    Busmaster tool: rbei-etas.github.io/busmaster/
    Kvaser Leaf CAN adapter: duckduckgo.com/?q=kvaser+leaf&t=osx
    The CANHack toolkit: github.com/kentindell/canhack
    The can2 protocol decoder for PulseView is also available at the above repository.
    PulseView: www.sigrok.org/wiki/Downloads

  • @KinzRulz
    @KinzRulz 3 роки тому +1

    How did the receiver manage not to give CRC errors?

    • @kentindell
      @kentindell  3 роки тому +2

      Because the Janus frame includes two CRCs as well as payloads. If you go to 7m06s you'll see the two bit patterns of each sequence printed out.

    • @KinzRulz
      @KinzRulz 3 роки тому

      @@kentindell Ah got it, 2 payload and CRC
      One is actual while the other is spiking only at 50% sampling point.
      Each receiver based on their sample point sees different data and CRC, so both acknowledges it.
      Wondering how the receiver controller managed phase errors and ReSync Jump Width due to more transitions from recessive to dominant introduced due to spiking.

    • @kentindell
      @kentindell  3 роки тому +1

      It exploits CAN sync rules: CAN only syncs on falling edges, only once per bit, and only if the previous bit sampled as a recessive.

    • @KinzRulz
      @KinzRulz 3 роки тому +1

      @@kentindell Thank you very much for your time and explanation.