FirmCAN: Sensitive CAN Knowledge Leakage from Automotive ECUs

  • Xinpeng Hao
  • , Xiangxue Li*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

As de facto standards of in-vehicle network communications among various ECUs (Electronic Control Units), CAN (Controller Area Network) protocols invented by Bosch rely on the privately defined unique identifiers CAN ID in CAN messages that do not convey any destination address. However, sticking to error-handling mechanisms in CAN protocols, an ECU with an amount of transmission errors would enter bus-off state (i.e., go offline thereupon) and shall be recovered according to some prescribed bus-off recovery mode (BOM). All this sensitive CAN knowledge concealed inside an ECU by OEMs (Original Equipment Manufacturers) shall not be revealed; however, it could have extensive practical applications, both for adversarial behavior (e.g., target ECU attacks) and for security enhancement mechanisms (e.g., intrusion detection system designs). The article presents FirmCAN, the first automatic analysis framework to dope out sensitive CAN knowledge (CAN IDs and bus-off recovery mode, in particular) compiled in automotive ECU firmwares. FirmCAN first identifies base address (using accurate absolute function entry addresses) and then performs CAN module API positioning and sensitive configuration information resolution. We buckle down to automotive ECUs that resort to fixed-address mailboxes as CAN module transmission buffers (e.g., Renesas SuperH/RA series) and present concrete algorithms for each analysis phase. Our experimental evaluations first investigate firmwares extracted from real automotive ECUs. We then develop our own applications using RA6M4 development boards, which not only produce required firmwares to evaluate FirmCAN but also create ground truth through hardware debugging. All evaluations demonstrate that FirmCAN can accurately garner above-mentioned sensitive CAN knowledge. FirmCAN can be trivially generalized to engage in extended frames and CAN modules with similar transmission logic, e.g., TI (Texas Instruments), ST (ST Microelectronics), and so on.

Original languageEnglish
Article number76
JournalACM Transactions on Embedded Computing Systems
Volume24
Issue number5
DOIs
StatePublished - 12 Sep 2025

Keywords

  • CAN identifier
  • CAN module
  • Internet of vehicles security
  • bus-off recovery mode
  • information leakage

Fingerprint

Dive into the research topics of 'FirmCAN: Sensitive CAN Knowledge Leakage from Automotive ECUs'. Together they form a unique fingerprint.

Cite this