Designing Software for SAE J1939 ECUs to Improve Cybersecurity
2025-01-8082
04/01/2025
- Features
- Event
- Content
- SAE J1939 is a CAN-based standard used for connecting various ECUs together within a vehicle. There are also some related protocols sharing many of the features of SAE J1939 across other industries including ISO11783, RVC and NMEA 2000. The standard has enabled the easy integration of electronic devices into a vehicle. However, as with all CAN-based protocols, several vulnerabilities to cyberattacks have been identified and are discussed in this paper. Many are at the CAN-level, whilst others are in common with those protocols from the SAE J1939 family of protocols. This paper reviews the known vulnerabilities that have been identified with the SAE J1939 protocol at CAN and J1939-levels, along with proposed mitigation strategies that can be implemented in software. At the CAN-level, the weaknesses include ways to spoof the network by exploiting parts of the protocol. Denial of Service is also possible at the CAN-level. At the SAE J1939-level, weaknesses include Denial of Service type attacks, exploiting the transport protocol and address claim features, and leaving the ECU inoperable. Finally, the implementation of covert communication channels using methods based on steganography is discussed. It is highlighted how this can be used as a means of attack and also as a means to protect a network.
- Pages
- 7
- Citation
- Quigley, C., "Designing Software for SAE J1939 ECUs to Improve Cybersecurity," SAE Technical Paper 2025-01-8082, 2025, https://doi.org/10.4271/2025-01-8082.