Gabriel Ciubotaru

Lead Security Researcher Garrett - Advancing Motion

BIOGRAPHY

Gabriel, is an automotive lead security researcher for Garrett Motion. His interests are finding vulnerabilities in modern automobiles communication networks and develop ways to protect them. He is an expert in embedded systems and has experience in reverse engineering techniques, malware detections and various security solutions.

CAN Bit-Stomping attack Prevention

Preventing a potential attack on an automotive internal communication network (example: CAN – Controller Area Network) can be a challenging and a time sensitive task. Below description provides a summary of a technique, CAN Bit-stomping which helps neutralizes the malicious commands sent over CAN, if detected by an Intrusion Detection System (IDS).

CAN bus follows a basis principle of not transferring the data to the destination if the integrity of the data is compromised. CAN Bit stomping method uses this same principle to violate the CRC and there by stopping the information to be transfer. Below paragraph explains the detailed methodology to violate the CRC.

CAN bus uses a differential 2 wire CAN-H and CAN-L topology which always stay opposite (low or high voltage). CAN bus could have 2 states: Recessive (CAN-H and CAN-L are derived to 2.5V) and Dominant (CAN-H is derived to 5V and CAN-L to 0V).  The idle state of the bus is recessive, the only operation a node needs to send data is to drive the bus to a dominant state, this way the data can be encoded in “Dominant / Recessive” (0 / 1). Whenever a single Recessive bit is overwritten by a Dominant one, the message CRC will be invalid, and the message will be ignored. This operation must be constructed by an independent custom CAN controller. To block messages on a 1 MB/s CAN BUS, a FPGA could be used to execute the operation.

This presentation is co-presented with Mihai Petre, Lead Software Engineer at Garret – Advancing Motion.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

JUN LI

Senior Security Researcher 360 Security Technology

Mircea Hasegan

Principal Software Engineer Ixia, a Keysight Business

Arun Mane

Founder and Director Amynasec labs LLP

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Business is a key division of Orange Romania, specializing in providing cutting-edge communication, technology, and digital transformation solutions tailored to businesses of all sizes. With a strong emphasis on innovation, Orange Business offers a wide array of services, including high-speed connectivity, cloud computing, cybersecurity, Internet of Things (IoT), and managed services. Their mission is to support organizations in their digital transformation journey by enhancing operational efficiency, improving customer experience, and maintaining a competitive edge in a rapidly changing digital environment.

Orange Business combines deep technological expertise with a customer-centric approach, ensuring that each solution is customized to meet the specific needs of their clients. Their commitment to innovation and excellence makes them a trusted partner for businesses seeking to thrive in the digital age.

PLATINUM PARTNERS
GOLD PARTNERS

 

SILVER PARTNER

BRONZE PARTNERS

HACKING VILLAGE PARTNERS

EXHIBITORS

VIP LOUNGE POWERED BY
ORGANIZER
INTERNATIONAL COMMUNITY PARTNERS
MEDIA PARTNERS

Add Your Heading Text Here