Hopping on the CAN Bus

Presented at ToorCon San Diego 16 (2014), Oct. 25, 2014, 5 p.m. (50 minutes)

In this talk, you’ll learn how to hack your car’s Controller Area Network (CAN) bus using a new open source toolkit. Recent papers and talks on automotive security have shown that automotive systems have many security flaws. One particularly vulnerable component is a vehicle’s CAN bus, which was never designed to be secure in the first place. We know the CAN bus is not secure, but how do we go about exploiting it? Commercial tools which are commonly used are quite expensive, and open-source software support for the CAN protocol is limited. In this talk, we’ll take a look at how automotive manufacturers actually utilize CAN, and explore how we can interact with it using CANard: a new open-source toolkit for working with CAN. By using open-source tools, we can work towards sharing of information on automotive systems. This information is indispensable to those wishing to tinker with their cars. By the end of this talk, attendees will learn how to interact with a live CAN bus, and see a demo of these tools in action.


  • Eric Evenchick
    Eric Evenchick is a freelance embedded systems developer. While studying electrical engineering at the University of Waterloo, he worked with the University of Waterloo Alternative Fuels Team to design and build a hydrogen electric vehicle for the EcoCAR Advanced Vehicle Technology Competition. Eric has also worked on automotive firmware at Tesla Motors, and is a contributor for Hackaday.com.


Similar Presentations: