CAN Bus Reverse-Engineering with a RaspberryPi /SocketCAN – A Practical example

  • Join the LiveStream
  • When: July 30, 2020 | 6 p.m. Central European Summer Time(UTC+02)

    Where: LiveStream

    Who: David Evans Connected Vehicle / Cybersecurity Lead at Applus+ IDIADA

    CAN Bus Reverse-Engineering with a RaspberryPi /SocketCAN – A Practical example

    This presentation will be based on using open source software and low-cost hardware to reverse-engineer CAN message exchanges on a 2010 Model Year vehicle and implementing software to emulate this exchange. This talk will present how a radio module interacts with an LCD screen module via CAN to display information, and how this interaction was captured and understood from the vehicle OBD port. Software implementing this exchange with the LCD screen module (running on a RaspberryPi connected to the CAN bus) will be presented, demonstrated by populating custom text in the vehicle and an implementation of both modules (using virtual SocketCAN) will be made available for participants to try out.

    About the Presenter:

    David graduated in 2012 with a BSc in Applied Computing at Waterford Institute of Technology, Ireland. His final year project (sponsored by Vector) involved controlling an iPad music player over CAN with Vector CAN hardware and software toolchain. The iPad’s gyroscope was also used as a steering wheel which controlled “virtual” adaptive headlights over CAN. In 2012 David relocated to Cambridge (UK) and has spent the last 8 years working for Applus IDIADA. In his role, he developed software for many UK and EU R&D projects, participates in UK industry working groups for connected vehicle, cybersecurity and mentors 2 PhD students in the area of automotive cybersecurity. David also leads the IDAPT OBU, a prototyping tool for Connected and Automated Vehicle R&D. Outside of work, David enjoys reverse-engineering topics in the area of retro computer games and automotive.

    Visit Speaker Profile