DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Controller area network decoder (CAN-D)

Abstract

A system and method for decoding an unknown automotive controller area network (“CAN”) message definitions. CAN data vehicle signal mappings are typically held in secret and varied by automotive model and year. Without knowledge of the mappings, the wealth of real-time vehicle data hidden in the automotive CAN packets is uninterpretable—impeding research, after-market tuning, efficiency and performance monitoring, fault diagnosis, and privacy-related technologies. This technology can ascertain the CAN signals' boundaries (start bit and length), endianness (byte ordering), signedness (binary-to-integer encoding) from raw CAN data. This allows conversion of CAN data to time series. Interpreting the translated CAN data's physical meaning and finding a linear mapping to standard units (e.g., knowing the signal is speed and scaling values to represent units of miles per hour) can be achieved for many signals by leveraging diagnostic standards to obtain real-time measurements of in-vehicle systems. The system and method can be integrated into lightweight hardware enabling an OBD-II plugin for real-time in-vehicle CAN decoding or run on standard computers. The system can output a standard DBC file with the signal definition information.

Inventors:
; ;
Issue Date:
Research Org.:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
2293690
Patent Number(s):
11780389
Application Number:
17/117,535
Assignee:
UT-Battelle, LLC (Oak Ridge, TN)
DOE Contract Number:  
AC05-00OR22725
Resource Type:
Patent
Resource Relation:
Patent File Date: 12/10/2020
Country of Publication:
United States
Language:
English

Citation Formats

Verma, Kiren E., Bridges, Robert A., and Hollifield, Samuel C. Controller area network decoder (CAN-D). United States: N. p., 2023. Web.
Verma, Kiren E., Bridges, Robert A., & Hollifield, Samuel C. Controller area network decoder (CAN-D). United States.
Verma, Kiren E., Bridges, Robert A., and Hollifield, Samuel C. Tue . "Controller area network decoder (CAN-D)". United States. https://www.osti.gov/servlets/purl/2293690.
@article{osti_2293690,
title = {Controller area network decoder (CAN-D)},
author = {Verma, Kiren E. and Bridges, Robert A. and Hollifield, Samuel C.},
abstractNote = {A system and method for decoding an unknown automotive controller area network (“CAN”) message definitions. CAN data vehicle signal mappings are typically held in secret and varied by automotive model and year. Without knowledge of the mappings, the wealth of real-time vehicle data hidden in the automotive CAN packets is uninterpretable—impeding research, after-market tuning, efficiency and performance monitoring, fault diagnosis, and privacy-related technologies. This technology can ascertain the CAN signals' boundaries (start bit and length), endianness (byte ordering), signedness (binary-to-integer encoding) from raw CAN data. This allows conversion of CAN data to time series. Interpreting the translated CAN data's physical meaning and finding a linear mapping to standard units (e.g., knowing the signal is speed and scaling values to represent units of miles per hour) can be achieved for many signals by leveraging diagnostic standards to obtain real-time measurements of in-vehicle systems. The system and method can be integrated into lightweight hardware enabling an OBD-II plugin for real-time in-vehicle CAN decoding or run on standard computers. The system can output a standard DBC file with the signal definition information.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2023},
month = {10}
}

Works referenced in this record:

Automobile Driver Fingerprinting
journal, September 2015


CluSim: a python package for calculating clustering similarity
journal, March 2019


Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection
conference, April 2017

  • Moore, Michael R.; Bridges, Robert A.; Combs, Frank L.
  • CISRC'17: Twelfth Annual Cyber and Information Security Research Conference, Proceedings of the 12th Annual Conference on Cyber and Information Security Research
  • https://doi.org/10.1145/3064814.3064816

CarMA: towards personalized automotive tuning
conference, January 2011


Time-Based CAN Intrusion Detection Benchmark
conference, January 2021


Automating ECU Identification for Vehicle Security
conference, December 2016


OBD_SecureAlert: An Anomaly Detection System for Vehicles
conference, May 2016


Towards a CAN IDS Based on a Neural Network Data Field Predictor
conference, March 2019

  • Pawelec, Krzysztof; Bridges, Robert A.; Combs, Frank L.
  • CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy, Proceedings of the ACM Workshop on Automotive Cybersecurity
  • https://doi.org/10.1145/3309171.3309180

Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification [Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification]
conference, February 2019


Intrusion detection system for automotive Controller Area Network (CAN) bus system: a review
journal, July 2019


Experimental Security Analysis of a Modern Automobile
conference, May 2010


OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame
conference, August 2017


ACTT: Automotive CAN Tokenization and Translation
conference, December 2018


An intrusion detection method for securing in-vehicle CAN bus
conference, December 2016

  • Gmiden, Mabrouka; Gmiden, Mohamed Hedi; Trabelsi, Hafedh
  • 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)
  • https://doi.org/10.1109/STA.2016.7952095

POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration
conference, October 2017

  • Li, Huaxin; Zhao, Li; Juliato, Marcio
  • CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
  • https://doi.org/10.1145/3133956.3138843

LibreCAN: Automated CAN Message Translator
conference, November 2019

  • Pesé, Mert D.; Stacer, Troy; Campos, C. Andrés
  • CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
  • https://doi.org/10.1145/3319535.3363190

Driver Identification Using Driving Behavior Signals
journal, March 2006


Field classification, modeling and anomaly detection in unknown CAN bus networks
journal, July 2017


Automatic Reverse Engineering of CAN Bus Data Using Machine Learning Techniques
book, November 2017


Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks
conference, October 2016