Write your awesome label here.

CAN Threats and Protections

Assessment of existing threats to CAN devices and systems. Justifications for lightweight protections, including non-cryptographic solutions.
  • Duration:  2.5 hours 
  • Video Time:  100 minutes
  • Author: Olaf Pfeiffer

What's covered?

  • OVERVIEW OF KNOWN CAN SYSTEM VULNERABILITIES

    Comparing CAN, CAN FD and CAN XL. Manipulations available to attackers with physical or logical access to a CAN system.
  • JUSTIFICATIONS FOR MODERATE PROTECTION

    Deeply embedded, often constraint devices. Requirement for proportional cost security measures.
  • NON-CRYPTOGRAPHIC AND CRYTOGRAPHIC SECURITY MEASURES

    From combining zoning/segmentation with secure gateways and security anomaly detection to full authentication and encryption.

Supporting Documents Included

  • Threats and Measures Overview Table

    Overview table (Excel) showing the various threats, potential security measures and how they translate to security levels potentially reachable.
  • Cryptographic Measures Overview Table

    Overview table (Excel) showing the available cryptographic measures, including lightweight solutions along with their implementation effort and costs.
Tutor

Olaf Pfeiffer

Olaf Pfeiffer studied technical computer science at the Cooperative University in Karlsruhe. He is one of the founders of the Embedded Systems Academy. Together with his partners, he wrote the books „Embedded Networking with CAN and CANopen“ and „Implementing Scalable CAN Security with CANcrypt“. He is a regular speaker at the international CAN Conferences and other events. Olaf is chairman of several CAN in Automation special interest groups, including the “HLP Cybersecurity”.
Created with