ERACAN
ERACAN
net/publication/383876245
CITATIONS READS
0 1,039
6 authors, including:
All content following this page was uploaded by Zhaozhou Tang on 20 September 2024.
Abstract 1 Introduction
The Controller Area Network (CAN) is a pivotal communication Since its introduction in the 1980s, the Controller Area Network
protocol extensively utilized in vehicles, aircraft, factories, and di- (CAN) has solidified its position as the primary in-vehicle net-
verse cyber-physical systems (CPSs). The extensive CAN security work and extended its influence to diverse cyber-physical systems
literature resulting from decades of wide usage may create an im- (CPSs), allowing hundreds of electronic control units (ECUs), which
pression of thorough scrutiny. However, a closer look reveals its govern various sensors, actuators, and CPS control functions, to
reliance on a specific threat model with a limited range of abilities. communicate. Decades of widespread adoption have spurred sub-
Notably, recent works show that this model is outdated and that stantial security research. Initially, accessing the bus was believed
a more potent and versatile model could soon become the norm, viable only through physical access, typically granted to autho-
prompting the need for a new defense paradigm. Unfortunately, the rized users. However, increased ECU connectivity challenged this
security impact of this emerging model on CAN systems has not assumption, allowing malicious attackers to exploit wireless chan-
received sufficient attention, and the defense systems addressing it nels such as WiFi, cellular, and Bluetooth to remotely compromise
are almost nonexistent. In this paper, we introduce ERACAN, the ECUs [8, 40, 45, 46, 68]. This shift ushered in a once-deemed unre-
first comprehensive defense system against this new threat model. alistic threat model: remote attackers.
We first begin with a threat analysis to ensure that ERACAN com- From an OSI standpoint, the standard outlines the communica-
prehensively understands this model’s capabilities, evasion tactics, tion rules of the physical and data link layers for a broadcast-based
and propensity to enable new attacks or enhance existing ones. bus and leaves the upper layers open to allow flexibility for various
ERACAN offers versatile protection against this spectrum of threats, use cases. Typical ECUs connect to the bus through a CAN protocol
providing attack detection, classification, and optional prevention controller and a transceiver, which enforce the specification rules
abilities. We implement and evaluate ERACAN on a testbed and a for the data link and physical layers, respectively. The existing lit-
real vehicle’s CAN bus to demonstrate its low latency, real-time erature assumed that remote attackers could control the ECU but
operation, and protective capabilities. ERACAN achieves detection not the controller or transceiver, effectively leaving the data link
rates of 100% and 99.7%+ for all attacks launched by the conven- and physical layers intact. This meant that they could only read or
tional and the enhanced threat models, respectively. write entire messages assembled by an unbroken CAN controller.
With these two capabilities, many works have shown that attackers
CCS Concepts could launch a plethora of attacks, including fake message injec-
• Security and privacy → Network security. tion, masquerading, flooding, error injection, and suspending other
ECUs [2, 4, 8, 9, 33, 39, 40, 45, 46, 58, 59, 68, 69].
Keywords As a response, researchers proposed several defense approaches.
Some explored protecting against certain attack types (e.g., mas-
Automotive Security; Controller Area Network; Intrusion Detection
querade) using techniques such as MACs or secret numbers to
ACM Reference Format: provide source authentication. However, due to limitations in-
Zhaozhou Tang, Khaled Serag, Saman Zonouz, Z. Berkay Celik, Dongyan cluding message length, busload, key management, and the lim-
Xu, and Raheem Beyah. 2024. ERACAN: Defending Against an Emerging ited processing powers of most ECUs, intrusion detection systems
CAN Threat Model. In Proceedings of the 2024 ACM SIGSAC Conference on
(IDSs) [10, 13, 19, 30–32, 52, 56, 57, 61, 72] gained more traction.
Computer and Communications Security (CCS ’24), October 14–18, 2024, Salt
Lake City, UT, USA. ACM, New York, NY, USA, 15 pages. https://doi.org/10.
These approaches, which contain a super-node handling the bulk
1145/3658644.3690267 of the security work, are more suitable for CAN systems due to
their performance-friendliness. The node monitors traffic and de-
This work is licensed under a Creative Commons Attribution- tects anomalies leveraging features, including message frequency,
NonCommercial International 4.0 License. payload, timing, and physical signal characteristics.
Despite the ostensible maturity of CAN security research, recent
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA developments suggest otherwise. While the literature assumes that
© 2024 Copyright held by the owner/author(s).
ACM ISBN 979-8-4007-0636-3/24/10
https://doi.org/10.1145/3658644.3690267
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA Zhaozhou Tang, et al.
remote attackers cannot control the link layer, recent works indi- S ID R Control Data CRC ACK EOF
cate that this assumption may be obsolete. Techniques including O T
F 11b R 6b 0-64b 16b 2b 7b
manipulating peripheral clock gating or remapping transceivers’
IO ports allow attackers substantial link layer control on many
ECUs [6, 14, 34, 63]. Unlike the Conventional Remote Attacker Figure 1: Format of a standard CAN data frame.
Model (CRAM), where only two basic abilities–sending and receiv-
ing entire messages through an intact controller–enabled various
attacks, the Enhanced Remote Attacker Model (ERAM) possesses ex- attaching a single monitor node. To help the research community
pansive capabilities, including injecting pulses, incomplete frames, build on ERACAN, we open source our FPGA design.1
and edge control. These boosted abilities introduce more advanced For inclusivity, we evaluate the performance and security of
attacks whose security implications are not fully investigated. Re- ERACAN on a testbed and a real vehicle’s CAN bus. ERACAN achieves
search demonstrates that the ERAM abilities may improve existing 100% detection for CRAM attacks, 99.7%-100% detection for ERAM
attacks [34, 43, 48], enable new attacks [64, 73], and circumvent attacks, and an attack classification accuracy of 98.8%-100%. Overall,
current defense systems. Surprisingly, no defense systems address- we make the following contributions:
ing this threat model are proposed, and a comprehensive analysis • We introduce ERACAN, the first defense system against the ERAM
of its security impact remains absent. model, offering real-time detection, classification, and optional
In response to this critical gap, we introduce ERACAN, the first prevention abilities for CRAM as well as ERAM attacks.
comprehensive defense system against ERAM attackers. ERACAN • We systematically threat-analyze ERAM to understand its features,
provides detection for all ERAM and CRAM attacks, with optional defense evasion tactics, and the attacks it enables or improves,
prevention where feasible. As ERAM spans various attacks, ERACAN as a basis for ERACAN and future ERAM defenses to build on.
also provides attack classification, making clear the specific type of • We propose a new autonomous surveillance mechanism for in-
attack it is reacting against. Defending against ERAM poses major tricate link layer events by delegating it to a configurable FPGA
challenges. C1: First, a thorough analysis needs to identify the full controller (ERACAN controller) to ensure parallel execution and
range of ERAM abilities, attacks, and security implications, which real-time performance. Additionally, we introduce a smart check-
is absent from prior works. C2: Second, confronting an attacker ing approach for physical layer features. Finally, we provide open
able to manipulate low-level events requires monitoring features access to our FPGA controller design to support further research.
spanning both the physical and link layers. A complete feature set • We offer a performance analysis as well as a security analysis of
covering all ERAM attacks is difficult to find due to the extensive ERACAN against various ERAM attacks and evasion tactics.
ERAM capabilities. Existing defenses focus on single feature cate- • We demonstrate ERACAN’s feasibility, real-time abilities, perfor-
gories, hindering the detection of most ERAM attacks. For example, mance, and protective capabilities by evaluating it on a testbed
defenses that identify message senders and check if they are legit- and a real vehicle’s CAN bus and achieve excellent results.
imate using voltage features cannot detect messages transmitted
by a legitimate sender using ERAM techniques to achieve malicious 2 Background
goals [64, 73]. C3: Finally, detection must ensure reliability and 2.1 CAN Basics
abide by deadlines for effective incident response (e.g., destroying
malicious messages before they are received). Crafting a monitoring Bit Encoding. CAN uses differential voltage between CANH and
strategy satisfying both goals presents another significant obstacle. CANL to encode bits. A positive (dominant) voltage denotes 0 and
Current sender identification approaches cannot detect attacks in- zero (recessive) voltage denotes 1. When two nodes send a 1 and 0
jecting short pulses. Similarly, using the GPIO to surveil the link concurrently, all nodes read a 0. If five identical bits are transmitted
layer is unreliable and computationally expensive. consecutively, a stuff bit of the opposite value is inserted.
We first address C1 by thoroughly analyzing the ERAM model Frame Format. Fig. 1 shows the various message fields. The ID
to understand its capabilities and security impacts through litera- determines the priority of a message, with lower IDs indicating a
ture review and extrapolation. We then identify the needed feature higher priority. When two nodes start transmission at the same
set including bit timing, voltage, and link layer events to cover all time, they perform arbitration. Each node sends one bit at a time.
ERAM attacks and address C2. Finally, to monitor these features and The first node to transmit a 1 yields. A message terminates with the
meet the requirements of C3, ERACAN uses a dedicated monitor End of Frame (EOF) field (seven 1s). The next consecutive message
node adopting a dual-faceted delegation, and smart checking strat- is separated by at least three additional Inter Frame Space bits (IFS).
egy. It deploys a customized FPGA controller (ERACAN controller) Error Handling. The CAN standard defines five kinds of errors:
for autonomous link layer surveillance to ensure reliability, cus- bit, stuff, form, CRC, and acknowledgement errors. Upon detecting
tomizability, and parallel execution. For the physical layer, ERACAN an error, nodes signal with an error frame. A CRC error is signaled
deviates from traditional sender identification. It mainly uses fea- after the ACK field. Other errors are signaled at the next bit after
tures to model valid message properties with simple equations and where they are detected.
performs checks selectively based on attack scenarios. This reduces Error States. Every node keeps a Transmit Error Counter (TEC)
complexity and simplifies processing to meet deadlines. ERACAN and a Receive Error Counter (REC) to keep track of errors encoun-
is cost-efficient and requires minimal hardware changes, merely tered during transmission or reception, respectively. If TEC or REC
1 https://tinyurl.com/5n77avxu
ERACAN: Defending Against an Emerging CAN Threat Model CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA
exceeds 127, nodes enter the error-passive state, where stricter er- CPU
ror signaling and transmission rules are enforced. If TEC or REC
exceeds 255, they enter the bus-off state and stop communicating. Data Clock
Sampling. CAN controllers divide a single bit into four segments of GPIO … CAN Controller … SPI
configurable durations: synchronization, propagation delay segment,
and the phase buffer 1 and 2 segments. Controllers interpret the bit Select
value at the sample point at the end of the phase buffer 1 segment. ECU Peripherals
Synchronization. A node expects 1→0 edges from other nodes TX RX
within the the synchronization segment. If it observes the edge CAN Transceiver
outside the synchronization segment, it resynchronizes either by
lengthening phase buffer 1 or shortening phase buffer 2 segment. CAN Bus
the physical layer’s rules as it uses the transceiver. In this section, Victim ID True Data Passive Error Frame
we first identify ERAM attackers’ capabilities and the features they
unlock. Then, by thoroughly reviewing and extrapolating existing Attacker Fake Data CRC
literature on link layer attacks [14, 43, 62], we analyze their secu- CAN Bus ID True Data Passive Fake
ErrorData
Frame CRC
rity impacts on aspects such as enabling new attacks, improving
True Data
existing ones, and circumventing existing defenses.
Figure 3: Frame hijacking attack.
1 Receiver1 1
Sender Receiver parts of the frame to change the system’s definition of a valid signal.
sample point Receiver2 sample point Transmitting messages with GPIO, the attacker may also directly
sample point
0 sample point 0 control bit timing of his messages to emulate the characteristics of
other ECUs and evade bit timing based approaches [47, 56, 74].
(a) Janus frame. (b) Counterfeit frame. On Error Handling Defenses. Some defenses attempt to prevent
CRAM error-handling attacks by making it difficult for the attacker
Figure 4: Attacks exploiting sample point differences. to transmit a message simultaneously with the victim. This is done
by randomizing the message’s transmission time or parts of its ID.
ERAM’s ability to time attacks accurately and inject errors arbitrarily
settings, they may adjust their bit durations differently, lose syn- bypasses any of these defenses as it could launch the attack once
chronization, and experience communication errors. the message or the fixed part of its ID appears.
Janus Frames. In Fig. 4a, when two nodes have different sample On Cryptographic Approaches. Some cryptographic approaches
points and an attacker sends a bit with a 1→0 or 0→1 transitions embed secret tokens in fields such as the ID to provide sender
between their sample points, they read different values. The attacker authentication [25, 70]. They are not secure under ERAM because
can send a carefully chosen frame with such transitions so two attackers can wait after these tokens are transmitted and then hi-
nodes receive different contents and do not detect errors [64, 73]. jack the frame. Further, approaches that keep message or freshness
Counterfeit Frames. Extrapolating the Janus frame idea, we de- counters between senders and receivers [26, 50, 66] may be vulner-
duce and verify that an attacker can flip bits from 1 to 0 in a sender’s able to the double receive attack (Sec. 4.2.1) as it could cause the
message without causing errors. For example in Fig. 4b, when the legitimate transmitter to send a message with the same counter
sender sends a 1, the attacker injects a 0 pulse after the sender’s twice. Finally, for content authentication defenses that use a cen-
sample point that lasts after the receiver’s sample point. The sender tral authenticator [35], Janus and counterfeit frame attacks (Sec.
samples a 1 and does not detect bit errors, while the receiver sam- 4.2.1) could be used to falsify a legitimate frame to keep it looking
ples a 0. The attacker can flip bits in both the data and CRC fields to valid for the authenticator but containing false data for some or all
modify a message received by the receiver without causing errors. receivers, depending on their sample points.
On Timing Based Approaches. Defenses using message timings
4.2.2 Improved Attacks. ERAM abilities can improve certain CRAM to assess authenticity, such as natural intervals [53, 61, 72] or secret
attacks and provide more stealth, reliability, and flexibility. delays [57, 71] between messages, are vulnerable under ERAM. At-
ERAM Error Injection. While CRAM attackers can inject errors tackers can hijack or counterfeit messages to modify their contents
by simultaneous transmission which usually involves injecting without changing their transmission time, evading such defense.
preceded messages to synchronize two messages (Sec. 2.2.1), an On Payload Inspection Approaches. Since these approaches only
ERAM attacker could inject an error directly, making it stealthier process application layer information, they cannot detect low-level
and more deterministic [14, 34, 43, 48]. Further, while CRAM has ERAM attacks, as noted by [14]. Moreover, they may be vulnerable
limited control over the location or type of the error, ERAM attackers to Janus and counterfeit frames posturing a benign message to them
have substantial control over both by injecting bits or error frames while containing malicious data for other receivers.
at any location of their choosing in a victim message. On Using Link Layer Rules for Defense. Some approaches
Physical Fingerprint Corruption. Building on voltage corrup- use certain link layer rules for defense purposes. For example, re-
tion attacks proposed by Bhatia et al. [4], we conceive an improved searchers suggest identifying a message’s sender by pushing it to
physical fingerprint corruption attack. Bhatia’s technique involves the error passive state [58], which some defenses use to identify
causing several errors, transitioning a node into the error-passive attackers [60]. Other papers suggest pushing attacker nodes to the
state, cooperating between two attacking ECUs, and other require- bus-off state [57]. Due to the non-compliance capability (Sec. 4.1),
ments. In the improved attack, however, ERAM attackers directly none of these techniques could be used against ERAM attackers.
inject pulses that overlap with parts of a victim’s message to corrupt Notably, CopyCAN [37] calculates ECUs’ error counters by moni-
their physical characteristics without any such needs, making it toring the link layer and reading error frames. Although it could
stealthier and more convenient. limit some ERAM attacks that cause errors (e.g., frame hijacking), it
could not detect attacks that do not or distinguish genuine errors.
4.3 Impacts on Existing Defenses
On Physical Signal Based Approaches. ERAM abilities are prob- 5 ERACAN Design
lematic to systems using physical signals to identify attackers or
detect intrusions. For example, many approaches use physical sig- 5.1 Architecture and Operation Overview
nal features from a specific part of the message to check authentic- ERACAN consists of a single node that connects to the bus and com-
ity [12, 32, 55, 56]. ERAM attackers could manipulate these systems prehensively monitors the data link and physical layers. It extracts
in several ways. For example, attackers could leave such parts of the specific features to detect and classify all ERAM attacks (Sec. 4.2).
message intact, but hijack the frame after they elapse. For systems For certain attack types, ERACAN offers an attack prevention option
that take several samples all over the message with online updates to be enabled or disabled by the system administrator. To address
[10], they only detect spoofing of entire messages and struggle with performance challenges of such ubiquitous monitoring, ERACAN
ERAM attacks that only require injecting short pulses, as [14] points adopts a dual approach of delegation and smart checking. It delegates
out. Moreover, the attacker may gradually corrupt or hijack small all link layer surveillance to a customized CAN controller (ERACAN
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA Zhaozhou Tang, et al.
Monitor Software
ECU Monitor 2 3 4 5
Hardware Start TDC Poll Timestamps Check Msg Validity & Authenticity Update Bit
Msg Edge & ADC Extract Bit Timing Authenticity, GPIO, Edge Count & No Timing
CAN Bus Timestamp Features Asymmetry Checks Model
TDC ID IRQ Attack
1 Attack
ERACAN ID, Wait for Msg has error Injected
Controller Interrupt Check Injected Error Error Attack Classification & 6
Anomaly Stop TDC
Asymmetry Check Optional Prevention
ADC & ADC
ECU Pulse Injection Check Legitimate Error
Voltage Anomaly
Figure 5: ERACAN monitor node architecture, workflow, and deployment on a CAN bus.
controller). For the physical layer, it uses a time-to-digital converter Asymmetry is an ECU’s unique physical fingerprint and depends
(TDC) to monitor time events, and an analog-to-digital converter on its transceiver switching characteristics [28, 56], signal reflec-
(ADC) to monitor voltage levels. However, they are monitored us- tion [36, 65], and load between the ECU and measuring unit [28, 56].
ing smart checking and only checked selectively based on attack Modeling Legitimate Bit Timing. We compute bit period and
scenarios. This greatly reduces the processing overhead. Below, we asymmetry measurements using all edges between a message’s
further describe these components and smart checking. ID and ACK fields. We model each ECU’s expected bit period and
ERACAN Controller. This customized CAN controller can be con- asymmetry using normal distributions 𝑁 (𝜇𝑇 , 𝜎𝑇2 ) and 𝑁 (𝜇𝐴 , 𝜎𝐴2 ).
figured to autonomously monitor certain link layer events. It stores Bit Timing Model Recreation. Bit timing models are recreated
information in registers and interrupts the software once events when a CAN bus is turned on after a period of inactivity. ECUs
occur. The software then queries and clears them after each inter- send calibration messages and ERACAN uses them to compute their
rupt. Moreover, if attack prevention is enabled, ERACAN controller distribution parameters and bit period variance within a message.
can inject errors to destroy malicious frames. Securing Model Recreation. ERACAN needs a cryptographic
TDC. ERACAN uses this to measure the timestamps of 1→0 and scheme that guarantees source authenticity and obfuscates the
0→1 edges of the signal from the transceiver. They are used to payload so attackers cannot predict it. Any scheme meeting these
extract and model two features: bit-period and asymmetry. We requirements can be used. In Appendix A, we explain an example
discuss their definition, extraction, and modeling in Sec. 5.2. lightweight scheme adopted from [57] for this step.
ADC. ERACAN uses this to measure the differential voltage levels Bit Timing Model Online Updates. If a message contains no
of the bus, which it uses to check for attackers’ error injections. errors and fails no legitimacy checks, ERACAN uses it to perform
Smart Checking Workflow. Fig. 5 shows ERACAN’s workflow. online updates to account for feature drift due to environmental
During operation, ERACAN controller continuously watches for sus- conditions. With each new measurement 𝑥, ERACAN updates distri-
picious link layer events and reads the ID of messages that appear bution parameters using Equations 3 and 4:
on the bus. TDC and ADC measurements are started only when a
𝜇𝑛 = 𝑤 𝜇𝑛−1 + (1 − 𝑤)𝑥 (3)
message’s ID field completes transmission. Initially, only TDC mea-
surements are used to extract the frame’s bit period and asymmetry
𝜎𝑛2 = 𝑤 [𝜎𝑛−1
2
+ (1 − 𝑤)(𝑥 − 𝜇𝑛−1 ) 2 ] (4)
in real-time. When its ACK field starts, ERACAN checks the mes-
sage’s bit period and asymmetry for validity and authenticity. If all A smaller 𝑤 gives new measurements a higher weight and helps
checks pass, ERACAN updates a model for these features. However, the model adapt to changes faster. For large environmental varia-
if a message is interrupted with an error, ERACAN checks if the error tions or low-frequency messages whose bit timing can accumulate
is legitimate or injected by the attacker. ERACAN checks bit timing substantial changes between messages, 𝑤 should be reduced.
first, and if no anomalies are found, only then does it process and Voltage Levels. Unlike sender identification approaches, ERACAN
check ADC measurements. When an attack is detected, ERACAN does not use voltage to achieve fine distinctions between ECUs, but
performs attack classification, and prevention if it is optionally only to distinguish between normal voltage levels and anomalies
enabled. We explain these procedures in detail in this section. caused by attacks. It uses a single feature in two scenarios: voltage
level variance to check for attack when a message contains errors
5.2 Feature Extraction and Modeling Details (Sec. 5.3), and mean voltage level to confirm if an attack is launched
by simultaneous transmission (Sec. 5.4). Since such distinctions
Bit Period: Equation 1 calculates an ECU’s bit period 𝑇 from the
are far more significant than differences among ECUs or under
time 𝑡 ↓↓ between consecutive 1→0 edges with 𝑛 ↓↓ bits in between:
environmental variations, fixed detection thresholds enable reliable
𝑡 ↓↓ performance (Sec. 8). Thus, ERACAN measures voltage levels once in
𝑇 = (1)
𝑛 ↓↓ a secure setting (e.g., during manufacturing). It records the expected
mean and variance of ECUs’ stable dominant voltage levels and
Asymmetry: Equation 2 computes an ECU’s asymmetry 𝐴 using
uses these to set fixed detection thresholds.
the time 𝑡 ↓↑ and the number of bits 𝑛 ↓↑ between a 1→0 edge and
Link Layer Information. We configure ERACAN controller to
the next 0→1 edge and its bit period 𝑇 :
report the following information: message IDs after their ID fields
𝐴 = 𝑡 ↓↑ − 𝑛 ↓↑𝑇 (2) terminate, the edge count between ID and ACK fields, errors and
ERACAN: Defending Against an Emerging CAN Threat Model CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA
Voltage / V
5: end if 2
6: 𝑧𝑒 ← |(𝐴¯ − 𝜇𝐴𝑒 )/𝜎𝐴𝑒 |
7: 𝑧𝑒 −1 ← |(𝐴¯ − 𝜇𝐴𝑒 −1 )/𝜎𝐴𝑒 −1 | Attacker-injected bit
8: 𝑧𝑒+1 ← |(𝐴¯ − 𝜇𝐴𝑒+1 )/𝜎𝐴𝑒+1 | 0
9: return 𝑧𝑒 < 𝑧𝑒 −1 and 𝑧𝑒 < 𝑧𝑒+1 0 10 20 30 40 50 60 70 80
Samples
their types, overload frames, discrepancies in sampled bits, and Figure 7: Voltage of pulse injection at a 0→1 transition.
abnormal frame formats. These can be expanded or customized
based on security requirements and identified attack vectors.
could inject a 0 when the victim is transmitting multiple 1s (Fig. 6a).
5.3 Legitimacy Checks Since the attacker’s pulse is not transmitted based on the victim’s bit
Authenticity Check. ERACAN computes the mean asymmetry of period, its 1→0 edge is not aligned with the expected bit boundary.
the CRC field to determine if a message is authentic using Algo- ERACAN checks all edges up to the start of an error frame for this
rithm 1. ERACAN maintains a sorted list of all ECUs’ expected asym- anomaly (If the error is a CRC error, the start of the error frame
metries. It first compares if a message’s asymmetry deviates too is not checked because it is signaled by receivers). It calculates bit
much from the authorized sender. If not, it computes the distance period 𝑇 with all pairs of consecutive 1→0 edges using Equation 1.
to the authorized sender and two ECUs with the closest asymmetry. It considers the message suspicious if any 𝑇 satisfies Equation 6,
It then checks if the distance to the authorized sender is the closest. where 𝑛 is the same threshold as asymmetry check:
A message is authentic only if it passes both checks. |𝑇 − 𝜇𝑇𝑉 | > 𝑛𝜎𝑇𝑉 (6)
Optional Additional Authentication. For systems experienc-
ing high environmental variations where ECUs’ asymmetries may Pulse Injection Check Using Voltage. If pulse injection check
change abruptly, an optional check is added to eliminate any possi- using bit timing does not find anomalies, ERACAN further checks
ble false positives. If a message fails Algorithm 1, ERACAN compares voltage. This accounts for the attacker injecting a pulse at a victim’s
its asymmetry with the last message from the authorized sender 0→1 transition (Fig. 6b). Due to imperfect bus termination and
and two ECUs with the closest asymmetry. It is deemed illegitimate signal reflections [65], voltage level oscillates after the victim’s
if the difference with the authorized sender is not the smallest. falling edge. Such oscillations are superposed on the injected pulse,
GPIO Check. This detects if a message is transmitted using GPIO, causing distortions in Fig. 7. They increase voltage level variance
the most convenient and flexible link layer manipulation technique. by orders of magnitude. Fig. 8 shows where ERACAN looks for
These messages’ bit timing is not derived from the ECU’s oscillator abnormal voltage levels. After the attacker injects a 0, the sender
but programmed by software. The variance of bit periods within the transmits an error frame at the next bit. Depending on where the
message multiplies due to greater uncertainty of software timing. bit is injected, receivers transmit an error frame at the next bit or
ERACAN considers a message suspicious if its intra-message bit pe- until they detect a stuff error after six consecutive 0s. Up to twelve
riod variance is greater than the expected variance of its authorized consecutive 0s are observed [20]. The receivers transmit the last
sender by at least twice. six bits, while voltage level anomalies are within the previous bits.
Asymmetry Check. This detects simultaneous transmission and Therefore, ERACAN finds bits before the last six in superposed error
pulse injection near edges in a message, which inevitably increases flags (highlighted in Fig. 8), extracts voltage samples in a 500ns
asymmetry (Sec. 6). ERACAN considers a message suspicious if any window around every bit boundary, and computes the variance
of its asymmetry measurements satisfies the following equation: within each window. An anomaly is detected if the variance within
any window is larger than the expected variance of the victim’s
𝐴 > 𝜇𝐴𝑒 + 𝑛𝜎𝐴𝑒 (5) stable dominant voltage levels by at least ten times.
𝑛 is a configurable threshold. Increasing 𝑛 to cover a larger part Overload Frames Check. ERACAN controller signals to software
of the distribution increases both false negative and false positive if an overload frame is observed. On modern networks they must
rates. Its setting is optimal when false positive and false negative be transmitted by an attacker as modern CAN controllers do not
rates are equal and should be determined empirically for each ECU. initiate overload frames and only react to them [64]. For legacy net-
Edge Count Check. ERACAN checks if the TDC measures more works where legitimate overload frames could arise, as the standard
timestamps than the expected edge count acquired by ERACAN specifies at most two consecutive overload frames can be gener-
controller, in case additional edges are injected by an attacker. ated [20], ERACAN controller alerts if additional ones are observed.
Pulse Injection Check Using Bit Timing. This checks if an error Last EOF Bit Check. ERACAN controller signals to software if a
in a message is caused by an attacker’s pulse injection. An attacker message’s last EOF bit is 0 but other fields are valid. The 0 could
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA Zhaozhou Tang, et al.
Attacker injects a 0
Monitor Victim Attacker
Sender Tx 0 0 1 0 0 0 0 0 0 1 1 1 ttrM ttrV ttrA
Receivers Tx 1 1 1 1 1 1 0 0 0 0 0 0 tpV→M tpA→V
CAN Bus 0 0 0 0 0 0 0 0 0 0 0 0
Start of sender’s error flags Start of receivers’ error flags
Figure 9: An example bus layout and propagation delays.
Figure 8: Error flags caused by error injection. identification using asymmetry in the CRC field and the first asym-
metry measurement of the message. It chooses the node with the
closest expected asymmetry to the measurements as the sender. If
the senders are different, the attack is frame hijacking since the first
only be transmitted by an attacker because no CAN controllers
asymmetry measurement should match the legitimate sender but
should send a 0 in this field if all previous message fields are valid.
the CRC field matches the attacker. Otherwise, it is a masquerading
Sampled Bits Discrepancies Check. ERACAN controller has two
attack as the entire message is sent by the attacker.
sets of sampling logic with different sample points. Their sampled
Attacks Failing Asymmetry or Edge Count Checks Only.
bits are compared in real-time. Any discrepancies indicate an attack
These could only be bit timing poisoning using pulse injection or
and ERACAN controller signals to software. To ensure discrepancies
simultaneous transmission. ERACAN again leverages voltage levels
in sampled bits between any nodes are visible, ERACAN controller’s
to distinguish each technique.
sample points could be set to the earliest (55.6%) and latest (90.9%)
allowed sample points according to protocol specifications [20]. 5.4.1 Attack Prevention Options. By default ERACAN only detects
Frame Format Check. ERACAN controller signals to software if and classifies attacks. Since ERACAN detects attacks with low false
a message does not fully comply with the CAN standard. This is positive rates in real-time, it can translate detection into prevention
an unorthodox frame from an attacker. Depending on their CAN for attacks compromising message integrity, including masquerad-
controller designs, legitimate ECUs could transmit certain kinds of ing, frame hijacking, Janus, and counterfeit frame attacks. ERACAN
unorthodox frames. Since ERACAN controller is implemented using offers prevention options for them that can be enabled per attack.
an FPGA, check policies can be customized based on what frame If enabled, ERACAN destroys messages with error frames if relevant
formats are not expected to be transmitted normally. checks fail (authenticity check for masquerading / frame hijacking
CRC Errors Check. ERACAN controller signals to software if a or sampled bits discrepancies check for Janus / counterfeit frames).
message is properly acknowledged by receivers but a CRC error is
signaled. This means the message is valid. The sender is operating 6 Security Analysis
correctly, and the CRC error could be injected by an attacker. Here we consider how ERACAN detects each ERAM attack, an at-
tacker’s potential evasion tactics, and ERACAN’s mitigations.
5.4 Attack Classification Masquerading and Frame Hijacking. Both attacks require the
If any check fails, ERACAN determines the attack type as follows. attacker to transmit the entire CRC field and fail authenticity check
Attacks Failing Controller Checks. Freeze doom loop, double using its asymmetry. If an attacker controls messages’ bit timing to
receive, Janus / counterfeit frame, and unorthodox frame attacks are emulate a victim by transmitting with GPIO, he fails GPIO check
classified based on the respective controller check they fail. even if he passes authenticity check.
Attacks Causing Errors. ERACAN distinguishes between synchro- Arbitration Denial. First, authenticity check confines an attacker
nization disruption, simultaneous transmission, or ERAM error injec- to launch the attack with his own ID. Then, since he must bypass
tion. Injecting pulses to disrupt synchronization causes additional the CAN controller, it is detected by GPIO check.
edges. Simultaneous transmission increases voltage levels after the ERAM Error Injection. ERACAN controller CRC errors check de-
ID field. ERACAN uses edge count and voltage levels to distinguish tects injecting CRC errors after the ACK field. Pulse injection check
them. Otherwise, ERAM error injection is the remaining possibility. detects injecting bit errors. A smart attacker could attempt to evade
Attacks Failing GPIO Check. ERACAN distinguishes between pulse injection check by accurately timing his injection to fall within
arbitration denial and bit timing poisoning. Bit timing poisoning the bound in Equation 6. The key difficulty is to accurately account
could also fail GPIO check if the attacker injects pulses near 1→ 0 for signal propagation delays through cables 𝑡𝑝 and transceiver
edges, changes a message’s bit period, and increases its variance. delays 𝑡𝑡𝑟 to translate the differential voltage into digital signals.
ERACAN confirms the attack is arbitration denial if none of the We consider an example bus layout in Fig. 9. The victim starts trans-
message’s asymmetry measurements match the legitimate sender mission at 𝑡 0 . The monitor and attacker each see the victim start
since the message is transmitted with another peripheral whose bit transmission at 𝑡 1 (Equation 7) and 𝑡 2 (Equation 8). The attacker
timing does not resemble its CAN controller. Otherwise, the attack then delays Δ𝑡 to inject a pulse at the mth bit in the message and
is bit timing poisoning since asymmetry measurements not altered the pulse arrives at the monitor at 𝑡 3 (Equation 9):
by the attacker still match the sender. 𝑡 1 = 𝑡 0 + 𝑡𝑡𝑟𝑉 + 𝑡𝑝𝑉 →𝑀 + 𝑡𝑡𝑟 𝑀 (7)
Attacks Failing Authenticity Check. If an attack fails authen-
ticity but not GPIO check, ERACAN distinguishes between mas- 𝑡 2 = 𝑡 0 + 𝑡𝑡𝑟𝑉 + 𝑡𝑝𝐴→𝑉 + 𝑡𝑡𝑟𝐴 (8)
querading attacks and frame hijacking. ERACAN performs sender 𝑡 3 = 𝑡 0 + 𝑡𝑡𝑟𝑉 + 2𝑡𝑝𝐴→𝑉 + 2𝑡𝑡𝑟𝐴 + 𝑡𝑝𝑉 →𝑀 + 𝑡𝑡𝑟 𝑀 + Δ𝑡 (9)
ERACAN: Defending Against an Emerging CAN Threat Model CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA
Figure 10: Manipulating bit timing by injecting pulses. Figure 11: Processing by ERACAN in each message field.
Equation 10 derives the value of 𝑇 the monitor uses for pulse injec-
tion check based on Equation 1. Substituting it into Equation 6, the and stuff bits for feature calculation since the attacker can predict
attacker must satisfy Equation 11 to evade detection: them by reading the preceding content. A message is not used if it
is retransmitted after an error. This is in case the attacker learns
𝑡 3 − 𝑡 1 2𝑡𝑝𝐴→𝑉 + 2𝑡𝑡𝑟𝐴 + Δ𝑡 a message’s content, injects an error, and then poisons bit timing
𝑇 = = (10)
𝑚 𝑚 in the retransmitted message. We choose the scheme in Appendix
2𝑡𝑝𝐴→𝑉 + 2𝑡𝑡𝑟𝐴 + Δ𝑡 A as it is lightweight and meets both requirements. Any schemes
| − 𝜇𝑇𝑉 | ≤ 𝑛𝜎𝑇𝑉 (11) meeting both requirements, such as [27, 49], can also be used.
𝑚
The attacker must accurately estimate 𝑡𝑝𝐴→𝑉 and 𝑡𝑡𝑟𝐴 and adjust Attacks Detected by Controller Checks. Freeze doom loop, double
Δ𝑡. This is not possible without physical access and direct mea- receive, Janus / counterfeit frames, and unorthodox frames are de-
surements. He could use the typical 5ns/m to estimate 𝑡𝑝 [18] and tected by ERACAN controller overload frames, last EOF bit, sampled
obtain reference 𝑡𝑡𝑟 from the transceiver’s datasheet, but these esti- bits discrepancies, and frame format checks respectively (Sec. 5.3).
mates are highly inaccurate due to environmental conditions and
manufacturing variations. Thus, an attacker has minimal chances 7 Performance Analysis
to evade detection and inject a single error. To inject more errors
7.1 Performance Deadlines
and change the victim’s error state, the probability of consistently
evading detection decreases exponentially. Fig. 11 shows ERACAN’s mandatory processing steps for every
Synchronization Disruption. An attacker must inject a pulse message (steps 1 to 6 in Fig. 5). Other processing is only required
after the synchronization segment in a sender’s recessive bit. Since after an error or attack. They have the following deadlines.
the synchronization segment is at least 1/25 of a bit time [20], the Timestamp Processing. After a message’s ID field completes,
attacker’s pulse is at least 1/25 of a bit time after a bit boundary and ERACAN takes 𝑇𝑇 𝑃 to retrieve and process each edge timestamps.
can always be detected by pulse injection check using Equation 6. This must finish before the next edge arrives, in the worst case
Attacks Using Simultaneous Transmission. This technique is within one bit time (2𝜇s on 500kbps bus). As we show in Sec. 8.4, this
used to inject errors or poison bit timing. When two nodes transmit can often finish well within the deadline and provide opportunities
simultaneously, they do not see the end of the preceded message to leverage the idle time before the next edge for other processing.
at the same time due to propagation delays [51]. They do not start Authenticity Check. After the ACK field starts, ERACAN performs
transmission at exactly the same time. Their misaligned pulses over- authenticity check in 𝑇𝐴𝐶 . It must finish before the last EOF bit to
lap, increasing pulse width and asymmetry. This fails asymmetry enable attack prevention using error frames. The deadline is (2 bit
check. The attacker could not evade detection since the increase in ACK field + 6 bit EOF) = 8 bit time (16𝜇s on 500kbps bus). ERACAN
asymmetry depends on propagation delays outside his control. calculates a message’s mean asymmetry in the CRC field iteratively
Poisoning Attacks on Bit Timing. To manipulate bit timing using each new measurement during timestamp processing. This
measurements, an attacker could inject small pulses into the vic- adds to 𝑇𝑇 𝑃 but helps authenticity check meet its deadline because
tim’s message to introduce extra timestamps. This is detected by ERACAN only has to run Algorithm 1 after the ACK field.
edge count check. Alternatively, he could inject pulses close to vic- Legitimacy Checks and Online Updates. Besides authenticity
tim’s edges to advance a 1→0 edge (Fig. 10a) or delay a 0→1 edge check, ERACAN also performs GPIO, edge count, and asymmetry
(Fig. 10b). According to Equation 2, both increase asymmetry and checks, in a time totaling 𝑇𝐶 . It then performs online updates in 𝑇𝑈 .
are detected by asymmetry check. Similar to error injection, evad- They must finish before the next message’s ID field completes. In the
ing asymmetry check requires accurate timing and has low success worst case assuming 100% bus load and no bit stuffing, the deadline
rates. Moreover, even if the attacker succeeds, he can only increase is (2 bit ACK field + 7 bit EOF + 3 bit IFS + 1 bit SOF + 11 bit ID) =
a single asymmetry measurement to at most 𝜇𝐴 + 5𝜎𝐴 . The change 24 bit time (48𝜇s on 500 kbps bus). ERACAN computes a running
to 𝜇𝐴 modeled by ERACAN is bounded. To significantly change 𝜇𝐴 , bit period variance for GPIO check and performs asymmetry check
the attacker must inject multiple pulses in the same message to once a measurement is acquired. This amortizes the cost and leaves
poison a large portion of measurements. All of them need to evade more time for the most time-consuming online updates.
detection, and the chance of success decreases exponentially.
Securing Model Recreation. A cryptographic scheme providing 7.2 Memory Overhead
source authenticity and payload obfuscation is required to prevent ERACAN’s arithmetic operations use 4-byte floating point numbers.
spoofing and bit timing poisoning. Since attackers cannot predict For each ECU, ERACAN stores 5 model parameters: 𝜇𝐴 , 𝜎𝐴 , 𝜇𝑇 , 𝜎𝑇 ,
the payload, they cannot poison bit timing by preparing the same and intra-message bit period variance. For 𝑁 ECUs, this requires
message for simultaneous transmission or anticipating edge posi- (20×𝑁 ) bytes. ERACAN also needs to buffer a message’s timestamps,
tions and injecting pulses. Moreover, we do not use the CRC fields bit period, and asymmetry measurements until they are used by
CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA Zhaozhou Tang, et al.
Table 1: Testbed setup for CRAM experiments. Table 2: Experiments results of CRAM attacks on the testbed.
Node MCU Transceiver Distance To Monitor Attack Masquerading Bus-Off Bit Timing Poisoning
Detection Rate 100% 100% 100%
ECU1 Arduino Due TJA1051 40cm
False Positive 0% 0.02% 0.02%
ECU2 Arduino Due TJA1051 60cm
ECU3 STM32F334 SN65HVD230 110cm
Proportion / %
Proportion / %
ECU4 STM32H755 TJA1051 170cm 75 ECU1 60 ECU1 / 2
ECU2 ECU1 & 2
ECU5 STM32F334 SN65HVD230 200cm ECU3
50 ECU4 40
ECU5
25 20
Frame Error Arbitration Synch. Janus Counterfeit Freeze Double Unorthodox Bit Timing
Attack
Hijacking Injection Denial Disruption Frame Frame D. Loop Receive Frame Poisoning
Detection Rate 100% 99.8-100% 100% 100% 100% 100% 100% 100% 100% 99.9-100%
False Positive 0% 0-0.04% 0% 0.04% 0% 0% 0% 0% 0% 0.02%
Percent
Experiment Sender Identification Frame Hijacking Error Injection Synch. Disruption Freeze D. Loop Double Receive
Accuracy 100% 100% 99.7-100% 100% 100% 100%
Asymmetry / ns
Asymmetry / ns
Reference Reference Table 6: ERACAN average authenticity check latency.
120 Poisoned 61.4 Poisoned
100
61.2 𝑁𝐸𝐶𝑈 5 6 7 8 9 10
80
Latency / 𝜇s 0.263 0.250 0.250 0.256 0.265 0.265
60 61.0
0 5000 0 5000
Messages Messages Table 7: ERACAN operation latencies.
(a) Without asymmetry check. (b) With asymmetry check.
Processing Stage Average Worst-Case Deadline
Figure 14: Asymmetry learned from online updates. Timestamp Processing 0.72𝜇s 1.34𝜇s 2𝜇s
Authenticity Check 0.26𝜇s 0.81𝜇s 16𝜇s
Checks & Online Updates 4.77𝜇s 21.4𝜇s 48𝜇s
Bit Timing Poisoning. We let the attacker poison bit timing using
pulse injection on one ID of an ECU. The attacker starts by cor-
rupting a small portion of a message, then gradually increases the messages is at maximum (Sec. 7.2), online updates take 32.8𝜇s. This
amount of corruption. We perform online updates on the IDs not most pessimistic estimate is still within the 48𝜇s deadline.
poisoned by the attacker and use this as a reference for the victim’s Real-Time Capability. We calculate the average and worst-case
true bit timing. We then perform online updates using all mes- latencies of each processing stage and compare them with the
sages including poisoned ones, with or without asymmetry check deadlines in Table 7. To calculate online updates latency, we use
enabled, and compare the learned asymmetry with the reference. our profiling results and the average and maximum number of
Without asymmetry check, the attacker successfully tricks ERACAN measurements per message from our test vehicle (18.6 and 26). All
into gradually learning a larger asymmetry as in Fig. 14a. With operations meet deadlines. Therefore, ERACAN can operate on a
asymmetry check the attack fails. The ECU’s asymmetry learned 500kbps CAN bus loaded up to 100% and guarantee all detected
by ERACAN closely resembles the reference as in Fig. 14b. masquerading and frame hijacking attacks can be prevented.
Double Receive, Freeze Doom Loop, and Synch. Disruption. Memory Footprint. We measure the code and data size of our
We achieve 100% detection for all of these attacks using ERACAN implementation and find them to be 16.7kB and 1.44kB, respectively.
controller checks or pulse injection check. As many recent commercial automotive-grade FPGAs offer at least
256kB on-chip memory [3], this overhead is reasonable.
8.4 Performance Evaluation
To test ERACAN’s feasibility and abilities to operate in real-time, 9 Benchmark Comparison
we connect it to a testbed with 5 ECUs operating at 500kbps and ERACAN is designed for ERAM attacks which other defenses do not
profile its latency as it processes 20000 messages. protect from, so it is hard to compare its performance with other
Timestamp Processing. ERACAN takes 0.4𝜇s on average to re- defenses on the same attack set. Instead, we compare ERACAN with
trieve one TDC timestamp and another 0.21𝜇s to calculate bit pe- separate defense categories, followed by its performance on CRAM
riod or asymmetry. This is well within the 2𝜇s deadline. Therefore, attacks that other systems also defend against.
ERACAN uses the remaining time for other processing, such as asym- Compared to Cryptography and Secret Delay IDS. As shown
metry checks. Adding them brings the processing time to 0.72𝜇s in Table 8, these approaches guarantee message authenticity under
on average and 1.34𝜇s in the worst case, still within the deadline. CRAM. They do not protect against error-handling attacks except
Authenticity Check. For 5 ECUs, authenticity check takes 0.26𝜇s for ZBCAN [57]. Under ERAM, all secret delay approaches and some
on average and 0.81𝜇s in the worst case. We experiment with up to cryptographic approaches lose their security guarantees (Sec. 4.3).
10 ECUs and show their average latency in Table. 6. The latency is Furthermore, they offer no security against the wide range of new
almost constant and it only takes 0.27𝜇s with 10 ECUs. Deadlines ERAM attacks (Sec. 4.2). ERACAN detects both CRAM attacks as
are always met despite the different number of ECUs on the testbed. well as all ERAM attacks. It is the first to offer attack classification,
GPIO and Edge Count Checks. GPIO check takes 33.8ns on aver- enabling intrusion responses to build on its output. Furthermore,
age and 70.8ns in the worst case. Edge count check takes 0.20𝜇s on ERACAN does not increase busload or reschedule bus traffic, which
average and 0.22𝜇s in the worst case. is required for some of these approaches.
Online Updates. It takes 0.23𝜇s on average and 0.78𝜇s at most to Compared to Physical Signal IDS. As shown in Table 8, they
process one asymmetry and bit period measurement. If every update only detect CRAM masquerading attacks but not error-handling
takes the worst-case 0.78𝜇s and the number of measurements in attacks, except for VoltageIDS [13]. However, some are evadable
ERACAN: Defending Against an Emerging CAN Threat Model CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA
Table 9: Benchmarking ERACAN authenticity check latency. Table 10: Performance comparison on masquerading attacks.
EASI [32] ASSASSIN [56] SPARTA [55] ERACAN Defense System Detection Prevention Deployment Cost
its checks do not depend on the technique to launch attacks. Its References
performance could weaken only in exceptional cases of arbitration [1] Natasha Alkhatib, Lina Achaji, Maria Mushtaq, Hadi Ghauch, and Jean-Luc
denial attacks. Specifically, if the attacker could manage to find a Danger. 2023. WIP: AMICA: Attention-based Multi-Identifier model for asyn-
chronous intrusion detection on Controller Area networks. In Symposium on
peripheral whose bit timing closely resembles the CAN controller, Vehicles Security and Privacy (VehicleSec).
abide by both the peripheral’s and CAN’s valid formats, and be [2] Khaled Serag Alsharif. 2023. PROACTIVE VULNERABILITY IDENTIFICATION
AND DEFENSE CONSTRUCTION – THE CASE FOR CAN. (2023).
originally authorized to transmit a high-priority ID. Even in this [3] AMD. 2024. XA Automotive Product Selection Guide. https://docs.amd.com/v/u/
case, since arbitration denial with a single message only delays the en-US/xa-portfolio-product-selection-guide.
victim’s message by its duration, the attacker must launch the attack [4] Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z Berkay Celik, Mathias Payer, and
Dongyan Xu. 2021. Evading Voltage-Based Intrusion Detection on Automotive
continuously to maximize the chance that the message misses its CAN.. In Network and Distributed System Security Symposium (NDSS).
deadline or prevent it from gaining bus access. ERACAN can be [5] Benjamin Blase. 2015. tdc-fpga: Time to digital converter for use on a Xilinx
extended to monitor message frequency to detect such scenarios. 7-series FPGA. https://github.com/benbr8/tdc-fpga.
[6] Tim Brom. 2018. CANT. https://github.com/bitbane/CANT.
Safeguarding the Monitor. Like most IDSs, we assume trust in a [7] Paolo Cerracchio, Stefano Longari, Michele Carminati, and Stefano Zanero. 2024.
central monitor. Nonetheless, we took measures to minimize the risk Investigating the Impact of Evasion Attacks Against Automotive Intrusion De-
tection Systems. In Symposium on Vehicles Security and Privacy (VehicleSec).
of its failure or compromise. First, we connected it in parallel, not [8] Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav
as a pass-through gateway. Thus, in the event of failure, it fails safe Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and
and bus communication continues. Second, to minimize the risk of Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive
Attack Surfaces. In USENIX Security Symposium.
compromise, we used hardware with security features: secure boot [9] Kyong-Tak Cho and Kang G. Shin. 2016. Error Handling of In-vehicle Networks
and secure key storage allow crucial assets (e.g., program image, Makes Them Vulnerable. In ACM SIGSAC Conference on Computer and Commu-
bitstream files for FPGA configuration) to be signed and encrypted, nications Security (CCS).
[10] Kyong-Tak Cho and Kang G. Shin. 2017. Viden: Attacker Identification on In-
preventing tampering. Finally, except for its connection to the CAN Vehicle Networks. In ACM SIGSAC Conference on Computer and Communications
bus, the monitor is air-gapped with no other entry points. Security (CCS).
[11] Kyong-Tak Cho and Kang G. Shin. 2016. Fingerprinting electronic control units
Bypassing Physical Layer Rules. In theory, remote attackers for vehicle intrusion detection. In USENIX Security Symposium.
could bypass physical layer rules by controlling more than 8 ECUs [41]. [12] Wonsuk Choi, Hyo Jin Jo, Samuel Woo, Ji Young Chun, Jooyoung Park, and
This assumption is unrealistic and not considered by ERACAN. To Dong Hoon Lee. 2018. Identifying ECUs Using Inimitable Characteristics of
Signals in Controller Area Networks. IEEE Transactions on Vehicular Technology
account for this, ERACAN could easily integrate existing solutions (2018).
to detect physical layer manipulations by flipping 0 to 1 [53]. [13] Wonsuk Choi, Kyungho Joo, Hyo Jin Jo, Moon Chan Park, and Dong Hoon Lee.
2018. VoltageIDS: Low-Level Communication Characteristics for Automotive
Intrusion Detection System. IEEE Transactions on Information Forensics and
11 Conclusions Security (2018).
In this paper, we aimed to bridge a critical gap in CAN security [14] Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, and
Stefano Zanero. 2022. CANflict: Exploiting Peripheral Conflicts for Data-Link
research: the escalating threat of remote attackers gaining exten- Layer Attacks on Automotive Networks. In ACM SIGSAC Conference on Computer
sive link layer control (ERAM model). We introduced ERACAN, the and Communications Security (CCS).
[15] Josh D Eckhardt, Thomas E Donofrio, and Khaled Serag. 2019. System and method
first comprehensive defense system tailored explicitly to counter of monitoring data traffic on a MIL-STD-1553 data bus. US Patent 10,467,174.
this attacker model in addition to the conventional model (CRAM), [16] Josh D Eckhardt, Thomas E Donofrio, and Khaled Serag. 2020. Multiple security
offering detection, classification, and prevention abilities against level monitor for monitoring a plurality of MIL-STD-1553 buses with multiple
independent levels of security. US Patent 10,685,125.
both models. We started with a security analysis of the ERAM model, [17] Bernd Elend and Tony Adamson. 2017. Cyber security enhancing CAN
focusing on its capabilities, attacks enabled, and impacts on con- transceivers. In International CAN Conference.
ventional defenses. We then designed ERACAN to monitor essential [18] International Organization for Standardization (ISO). 2016. Road Vehicles —
Controller area network (CAN). Part 2: Highspeed medium access unit.
link and physical layer features for securing against all ERAM [19] Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, and Thidapat
attacks. ERACAN addresses complex performance and reliability Chantem. 2019. SIMPLE: single-frame based physical layer identification for
intrusion detection and prevention on in-vehicle networks. In Annual Computer
challenges posed by such meticulous monitoring by delegating Security Applications Conference (ACSAC).
link layer surveillance to an autonomous ERACAN controller and [20] Robert Bosch GmbH. 1991. CAN Specification. (1991).
employing innovative smart-checking to leverage physical signals [21] Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede.
2012. Libra-can: a lightweight broadcast authentication protocol for controller
efficiently. We analyzed ERACAN’s security against various ERAM area networks. In International Conference on Cryptology and Network Security.
attacks and evasion tactics. Finally, we validated ERACAN’s feasibil- [22] Bogdan Groza, Lucian Popa, and Pal-Stefan Murvay. 2018. INCANTA - INtrusion
ity, security, performance, and real-time capabilities by evaluating Detection in Controller Area Networks with Time-Covert Authentication. In
Security and Safety Interplay of Intelligent Software Systems.
it on a testbed and a real vehicle’s CAN bus. [23] Bogdan Groza, Lucian Popa, and Pal-Stefan Murvay. 2021. CANTO - Covert
AutheNtication With Timing Channels Over Optimized Traffic Flows for CAN.
IEEE Transactions on Information Forensics and Security (2021).
Acknowledgments [24] Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, and Asaf Shabtai.
We thank the anonymous reviewers for their invaluable feedback 2021. CANARY - a reactive defense mechanism for Controller Area Networks
based on Active RelaYs. In USENIX Security Symposium.
and our shepherd for the guidance in the revision process. This work [25] Kyusuk Han, André Weimerskirch, and Kang G. Shin. 2015. A practical solution
was supported in part by the National Science Foundation (NSF) to achieve real-time performance in the automotive network by randomizing
under the Secure and Trustworthy Cyberspace (SaTC) program frame identifier. In ESCAR Europe.
[26] Oliver Hartkopp and R Schilling. 2012. Message authenticated CAN (MaCAN).
and Grant CNS-2144645, as well as the Office of Naval Research In ESCAR.
(ONR) under Grants N00014-22-1-2671 and N00014-18-1-2674. Any [27] Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication
opinions, findings, and conclusions in this paper are those of the protocol for securing in-vehicle networks. In EASCAR.
[28] Magnus-Maria Hell. 2015. The physical layer in the CAN FD world-The update.
authors and do not necessarily reflect the views of our sponsors. In International CAN Conference.
ERACAN: Defending Against an Emerging CAN Threat Model CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA
[29] Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. 2020. CANSen- [54] Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, and Radha Pooven-
try: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing dran. 2018. Cloaking the clock: Emulating clock skew in controller area networks.
Attacks. In European Symposium on Research in Computer Security (ESORICS). In ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[30] Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan "John" Rhee, Yuseok Jeon, An- [55] Oleg Schell and Marcel Kneib. 2023. SPARTA: Signal Propagation-based Attack
tonio Bianchi, Dongyan Xu, and Dave (Jing) Tian. 2022. ShadowAuth: Backward- Recognition and Threat Avoidance for Automotive Networks. In ACM Asia
Compatible Automatic CAN Authentication for Legacy ECUs. In ACM ASIA Conference on Computer and Communications Security.
Conference on Computer and Communications Security. [56] Oleg Schell, Claudio Oechsler, and Marcel Kneib. 2022. Asymmetric Symbol
[31] Marcel Kneib and Christopher Huth. 2018. Scission: Signal Characteristic-Based and Skew Sender Identification for Automotive Networks. IEEE Transactions on
Sender Identification and Intrusion Detection in Automotive Networks. In ACM Information Forensics and Security (2022).
SIGSAC Conference on Computer and Communications Security (CCS). [57] Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar
[32] Marcel Kneib, Oleg Schell, and Christopher Huth. 2020. EASI: Edge-Based Sender Kumar, Z. Berkay Celik, and Dongyan Xu. 2023. ZBCAN: A Zero-Byte CAN
Identification on Resource-Constrained Platforms for Automotive Networks. In Defense System. In USENIX Security Symposium.
Network and Distributed System Security Symposium (NDSS). [58] Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, and Dongyan Xu.
[33] Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, 2021. Exposing New Vulnerabilities of Error Handling Mechanism in CAN. In
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav USENIX Security Symposium.
Shacham, et al. 2010. Experimental security analysis of a modern automobile. In [59] Khaled Serag, Vireshwar Kumar, Z Berkay Celik, Rohit Bhatia, Mathias Payer,
IEEE Symposium on Security and Privacy (S&P). and Dongyan Xu. 2022. Attacks on can error handling mechanism. In Workshop
[34] Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo, and Vyas Sekar. 2021. CAN- on Automotive and Autonomous Vehicle Security (AutoSec).
NON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive [60] Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, and
Microcontrollers. In IEEE Symposium on Security and Privacy (S&P). Hyo Jin Jo. 2023. RIDAS: Real-time identification of attack sources on controller
[35] Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro area networks. In USENIX Security Symposium.
Miyashita, and Satoshi Horihata. 2014. CaCAN-centralized authentication system [61] Hyun Min Song, Ha Rang Kim, and Huy Kang Kim. 2016. Intrusion detection
in CAN (controller area network). In ESCAR. system based on the analysis of time intervals of CAN messages for in-vehicle
[36] Hansang Lim, Gyunha Kim, Seungsu Kim, and Dongok Kim. 2019. Quantitative network. In International Conference on Information Networking (ICOIN).
analysis of ringing in a controller area network with flexible data rate for reliable [62] Ken Tindell. 2020. CAN Bus Security: Attacks on CAN bus and their mitigations.
physical layer designs. IEEE Transactions on Vehicular Technology (2019). Technical Report. Canis Automotive Labs.
[37] Stefano Longari, Matteo Penco, Michele Carminati, and Stefano Zanero. 2019. [63] Ken Tindell. 2020. CANHack. https://github.com/kentindell/canhack.
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for [64] Ken Tindell. 2020. Three new CAN protocol hacks. https://kentindell.github.io/
Controller Area Network. In ACM Workshop on Cyber-Physical Systems Security 2020/01/20/new-can-hacks/.
& Privacy. [65] Ken Tindell. 2022. Running high speed signals through CAN bus wiring. https:
[38] Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati, //kentindell.github.io/2022/11/15/canbus-wiring/.
and Stefano Zanero. 2023. Candito: improving payload-based detection of at- [66] Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011.
tacks on controller area networks. In International Symposium on Cyber Security, CANAuth-a simple, backward compatible broadcast authentication protocol
Cryptology, and Machine Learning. for CAN bus. In ECRYPT Workshop on Lightweight Cryptography.
[39] Charlie. Miller and Chris. Valasek. 2013. Adventures in automotive networks [67] Armin Wasicek, Mert D Pesé, André Weimerskirch, Yelizaveta Burakova, and
and control units. Def Con (2013). Karan Singh. 2017. Context-aware intrusion detection in automotive control
[40] Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered systems. In ESCAR USA.
passenger vehicle. Black Hat USA (2015). [68] Haohuang Wen, Qi Alfred Chen, and Zhiqiang Lin. 2020. Plug-N-Pwned: Com-
[41] Abdullah Zubair Mohammed, Yanmao Man, Ryan Gerdes, Ming Li, and Z Berkay prehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air
Celik. 2022. Physical layer data manipulation attacks on the can bus. In Workshop Attack Surface in Automotive IoT. In USENIX Security Symposium.
on Automotive and Autonomous Vehicle Security (AutoSec). [69] Marko Wolf, André Weimerskirch, and Christof Paar. 2004. Security in automotive
[42] Igor Mohor. 2017. CAN Protocol Controller. https://opencores.org/projects/can. bus systems. In Workshop on Embedded Security in Cars.
[43] Pal-Stefan Murvay and Bogdan Groza. 2017. DoS Attacks on Controller Area [70] Samuel Woo, Daesung Moon, Taek-Young Youn, Yousik Lee, and Yongeun Kim.
Networks by Fault Injections from the Software Layer. In International Conference 2019. CAN ID shuffling technique (CIST): Moving target defense strategy for
on Availability, Reliability and Security (ARES). protecting in-vehicle CAN. IEEE Access (2019).
[44] Pal-Stefan Murvay and Bogdan Groza. 2020. TIDAL-CAN: Differential Timing [71] Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. 2019.
Based Intrusion Detection and Localization for Controller Area Network. IEEE TACAN: Transmitter authentication through covert channels in controller area
Access (2020). networks. In ACM/IEEE International Conference on Cyber-Physical Systems (IC-
[45] Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-fall: Hacking tesla from wireless CPS).
to can bus. Black Hat USA (2017). [72] Clinton Young, Habeeb Olufowobi, Gedare Bloom, and Joseph Zambreno. 2019.
[46] Sen Nie, Ling Liu, Yuefeng Du, and Wenkai Zhang. 2018. Over-the-air: How Automotive intrusion detection based on constant can message frequencies across
we remotely compromised the gateway, BCM, and autopilot ECUs of Tesla cars. vehicle driving modes. In ACM Workshop on Automotive Cybersecurity.
Black Hat USA (2018). [73] Li Yue, Zheming Li, Tingting Yin, and Chao Zhang. 2021. Cancloak: Deceiving
[47] Shuji Ohira, Araya Kibrom Desta, Ismail Arai, and Kazutoshi Fujikawa. 2021. two ecus with one frame. In Workshop on Automotive and Autonomous Vehicle
PLI-TDC: Super fine delay-time based physical-layer identification with time-to- Security (AutoSec).
digital converter for in-vehicle networks. In ACM Asia Conference on Computer [74] Jia Zhou, Prachi Joshi, Haibo Zeng, and Renfa Li. 2019. Btmonitor: Bit-time-based
and Communications Security. intrusion detection and attacker identification in controller area network. ACM
[48] Andrea Palanca, Eric Evenchick, Federico Maggi, and Stefano Zanero. 2017. Transactions on Embedded Computing Systems (TECS) (2019).
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive
Networks. In Conference on Detection of Intrusions and Malware & Vulnerability
Assessment (DIMVA). A Secure Model Recreation Details
[49] Mert D Pesé, Jay W Schauer, Junhui Li, and Kang G. Shin. 2021. S2-CAN: Suffi- Each ECU has a secret key pre-shared only with the monitor. Details
ciently Secure Controller Area Network. In Annual Computer Security Applications
Conference (ACSAC). on establishing the key are outside the scope of this paper. Using
[50] Andreea-Ina Radu and Flavio D Garcia. 2016. LeiA: A lightweight authentication these keys, each ECU securely generates and exchanges a random
protocol for CAN. In European Symposium on Research in Computer Security
(ESORICS).
seed with the monitor when model recreation starts. Using the
[51] Stuart Robb and East Kilbride. 1999. CAN bit timing requirements. Motorola seed, pre-shared key, and an agreed-upon pseudo-random function
Semiconductor Application Note, AN1798 (1999). (PRF), the ECU and monitor generate a session key. Next, using
[52] Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, and Srd-
jan Capkun. 2023. EdgeTDC: On the Security of Time Difference of Arrival the seed, session key, and PRF, they generate the same random
Measurements in CAN Bus Systems. In Network and Distributed System Security sequence. For each calibration message, the ECU uses the next 64
Symposium (NDSS). bits of the sequence as its data field. The monitor compares the data
[53] Matthew Rogers, Phillip Weigand, Jassim Happa, and Kasper Rasmussen. 2023.
Detecting CAN Attacks on J1939 and NMEA 2000 Networks. IEEE Transactions field to the next 64 bits in the ECU’s sequence to check a message’s
on Dependable and Secure Computing (2023). authenticity, before using it to create bit timing model.