Reverse Engineering of CAN (Controller Area network) of an Electric vehicle
2026-26-0150
To be published on 01/16/2026
- Content
- The communication between different vehicle electronic controller units (ECU) for various applications (I.e. To propel the vehicle or for In-vehicle Infotainment) CAN (Controller Area Network) is most frequently used for In-Vehicle communication. Given the proprietary nature and lack of standardization in CAN (Controller Area Network) configurations, which are often not disclosed by manufacturers, the process of CAN reverse engineering becomes highly complex and cumbersome. Additionally, the scarcity of publicly accessible data on electric vehicles, coupled with the rapid technological advancements in this domain, has resulted in the absence of a standardized and automated methodology for reverse engineering the Controller Area Network (CAN). This process is further complicated by the diverse CAN configurations implemented by various Original Equipment Manufacturers (OEMs), which are often not disclosed to the public. In this paper the manual approach is taken for reverse engineering for series CAN configuration of an electric vehicle, considering no vehicle information is available to testing engineers. To execute reverse engineering the CAN data log is to be taken from the OBD-II port by systematically identifying and mapping the CAN with various ECUs interfaced with that CAN line. Driver actions and continuous data logged from the OBD-II port are cross-referenced with CAN data to determine the byte order of signals and message frames. The signals derived from one vehicle use scenario (driving) are then validated against another scenario (charging) to ensure consistency and accuracy. Keywords: OBD-II, Controller Area Network (CAN), ECU, Reverse Engineering
- Citation
- KUMAR, R., Sahu, H., Penta, A., and Bhatt, P., "Reverse Engineering of CAN (Controller Area network) of an Electric vehicle," SAE Technical Paper 2026-26-0150, 2026, .