Presentation 2015-03-04
Yet Another Electrical Forgery Attack on CAN using Strong Recessive
Takeshi SUGAWARA, Minoru SAEKI, Manabu MISAWA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Yet another "electrical forgery attack" against Controller Area Network (CAN) is described. The electrical forgery attack is a class of attacks by strong attackers who can manipulate devices at the physical layer. The presented attack defeats the conventional countermeasure in which a spoofed frame is cancelled by colliding it with an error frame. The attack uses immutable frames. The high priority of error frames originates from the priority of logical 0 over 1. The attacker manipulates devices at the physical layer to changes the priority between 0 and 1. That leads to immutable frames that have higher priority over error frames.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Controller Area Network / Electrical Forgery Attack
Paper # ICSS2014-74
Date of Issue

Conference Information
Committee ICSS
Conference Date 2015/2/24(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Yet Another Electrical Forgery Attack on CAN using Strong Recessive
Sub Title (in English)
Keyword(1) Controller Area Network
Keyword(2) Electrical Forgery Attack
1st Author's Name Takeshi SUGAWARA
1st Author's Affiliation Mitsubishi Electric Corporation()
2nd Author's Name Minoru SAEKI
2nd Author's Affiliation Mitsubishi Electric Corporation
3rd Author's Name Manabu MISAWA
3rd Author's Affiliation Mitsubishi Electric Corporation
Date 2015-03-04
Paper # ICSS2014-74
Volume (vol) vol.114
Number (no) 489
Page pp.pp.-
#Pages 6
Date of Issue