J1939 Attack Videos
To download a zip file of all of the videos attack data and an archive of the previous attacks, scroll to the bottom of the page.
To get a citation for our work, please click Copy to get the videos citation
Torque/Speed Control One Attack
By changing the second and third byte of the “torque/Speed Control 1” message will result in a physical change in the truck. In this experiment, we changed the “engine requested speed/speed limit” to a high value which resulted in the truck speeding up.
To see CAN data of the attack, click the download button
Download FilePedal Jam
By setting the fourth byte of the “torque/speed control 1” message to zero, it will result in the accelerator pedal not working.
To see CAN data of the attack, click the download button
Download FileFabrication
By sending periodic messages we can disrupt the display on the dashboard
To see CAN data of the attack, click the download button
Download FileDoS Attack
A denial-of-service(DoS) attack is initiated when the internal network is overloaded with information, and in this case, causing the tachometer and speedometer to have no readings.
To see CAN data of the attack, click the download button
Download FileAddress Claim
An address claim is when the user sends a message claiming an address and informs all other components that you claimed that address. By claiming that address you can shut down the real use for that address.
By claiming the source address of ECM it can no longer send messages on the bus. Therefore, we don’t see data coming from the ECM as it can no longer send messages.
To see CAN data of the attack, click the download button
Download FileTo see CAN data of our trip from Colorado to Michigan click the button
Download FileClick download to get a zip file of all of the videos attack data
Download FileClick download to download a full archive of attack data that our group has collected
Download File