Is it easy to reverse engineer CAN data?
On this course, through open source simulation tools, CAN data will be captured and a potential replay attack will be demonstrated.
A systematic appreciation will also be demonstrated for privacy and policy issues regarding the use of personal and sensitive data generated on modern automotive platforms, in the context of sensing, communication and storage.
- Kali Linux
- Replay attack
What will you achieve?
By the end of the course, you‘ll be able to...
- Demonstrate practical attacks on CAN protocol
- Record CAN data and understand its content
- Explore the ability to reverse engineer captured CAN data
- Perform replay attack on CAN protocol
Who is the course for?
MSc Cyber Security students.
Please note that the individuals detailed in the ‘Who will you learn with?’ section below, are current staff members and may be subject to change.