DefCamp is the most important conference on Hacking & Information Security in Central and Eastern Europe.
Every year, the event brings together security leaders, hackers, tech experts, developers, business executives, academia representatives, and students for two days of knowledge sharing and practical skill-building. This year, DefCamp is celebrating the 10th anniversary and welcoming over 2000 participants from 40+ countries to Bucharest.
Join us at DefCamp 2019!
Connectivity, autonomy, electrification and shared economy are increasing vehicle complexity. That is why Garrett Motion is continuously innovating and developing its Connected Vehicle portfolio to ensure safer, cleaner and more reliable mobility solutions.
Our Connected Vehicle portfolio includes vehicle monitoring and management solutions. We help vehicle manufacturers safeguard vehicle integrity at all times by detecting, reporting and preventing anomalies that might occur. We deliver Automotive Cybersecurity, OEM Diagnostic and Prognostic, and Fleet Early Warning System solutions to our customers and fleet operators, to help unlock the full potential of automotive connectivity.
Connectivity, autonomy, electrification and shared economy are increasing the vehicle complexity, that is why we offer Connected Vehicle solutions, Best-in-Class vehicle monitoring and management solutions.
Meet with Gabriel Ciubotaru – Lead security researcher and Mihai Petre – Lead software engineer – Automotive Cyber Security at Garrett – Advancing Motion. Dive into the latest research and news from the cybersecurity market that will be presented and discussed during engaging panels and Q&A sessions.
They are experienced automotive professionals who devoted much of their careers to develop solutions in powertrain, controls, embedded, and system integration for Tier1s and OEMs.
Preventing a potential attack on an automotive internal communication network (example: CAN – Controller Area Network) can be a challenging and a time sensitive task. Below description provides a summary of a technique, CAN Bit-stomping which helps neutralizes the malicious commands sent over CAN, if detected by an Intrusion Detection System (IDS).
CAN bus follows a basis principle of not transferring the data to the destination if the integrity of the data is compromised. CAN Bit stomping method uses this same principle to violate the CRC and there by stopping the information to be transfer. Below paragraph explains the detailed methodology to violate the CRC.
CAN bus uses a differential 2 wire CAN-H and CAN-L topology which always stay opposite (low or high voltage). CAN bus could have 2 states: Recessive (CAN-H and CAN-L are derived to 2.5V) and Dominant (CAN-H is derived to 5V and CAN-L to 0V). The idle state of the bus is recessive, the only operation a node needs to send data is to drive the bus to a dominant state, this way the data can be encoded in “Dominant / Recessive” (0 / 1). Whenever a single Recessive bit is overwritten by a Dominant one, the message CRC will be invalid, and the message will be ignored. This operation must be constructed by an independent custom CAN controller. To block messages on a 1 MB/s CAN BUS, a FPGA could be used to execute the operation.