Abstract:
Recent advancements in 3D-printing/additive manufacturing has brought forth a new interest in the use of controller area network (CAN) for multimodule, plug-and-play bus ...Show MoreMetadata
Abstract:
Recent advancements in 3D-printing/additive manufacturing has brought forth a new interest in the use of controller area network (CAN) for multimodule, plug-and-play bus support for their embedded systems. CAN systems provide a variety of benefits that can outweigh typical conventional wire-loom protocols in many categories. However, implementation of CAN also brings forth vulnerabilities provided by its spoofable, destination-encoded shared communication bus. These vulnerabilities result in undetectable fault injection, packet manipulation, unauthorized packet logging/sniffing, and more. They also provide attackers the capability to manipulate all sensor information, commands, and create unsafe operating conditions using only a single compromised node on the CAN network (bypassing all root-of-trust in the modules). Thus, malicious hardware requires only a connection to the bus for access to all traffic. In this article, we discuss the effects of repurposed CAN-based attacks capable of manipulating sensor data, overriding systems, and injecting dangerous commands on the CAN using various entry methods. As a case study, we also showed a spoofing attack on critical data modules within a commercial 3D printer.
Published in: IEEE Consumer Electronics Magazine ( Volume: 13, Issue: 1, January 2024)