All Courses
All Courses
Courses by Software
Courses by Semester
Courses by Domain
Tool-focused Courses
Machine learning
POPULAR COURSES
Success Stories
Que. Write a program that performs a binary search for any given signal (The instrument cluster can be used as a source for CAN traffic) - It should record a log, assisted by user prompt, and replay all other subsequent logs according to a prompt that the user checks (Did the signal occur again? Y/N) - After every…
Rishabh Bhojankar
updated on 30 Nov 2023
Que. Write a program that performs a binary search for any given signal (The instrument cluster can be used as a source for CAN traffic)
- It should record a log, assisted by user prompt, and replay all other subsequent logs according to a prompt that the user checks (Did the signal occur again? Y/N)
- After every iteration, the number of messages remaining in the kept log should be displayed.
1. The desired outcome is not one particular signal, rather an interactive program that the user can use to automate the binary search process
2. This project will demand extensive use of Bash to manage files in the working directory, split files in half, use the CAN tools, etc.
Solution:
Program that Performs a Binary Signals in ICSIM:
Interface the virtual can bus (vcan0) using the given commands shows in a picture command.
ICSIM [Instrument Cluster Stimulator]:
In ICSim the instrument Cluster is starts
Command: ./icsim vcan0
In ICsim the joystick controller is starts which is used to control the virtual instrument cluster.
Command: ./controls vcan0
(a). Program to set the speedometer
In ICSim the virtual CAN message for acceleration using command in while loop format to rise the acceleration upto 120kph in virtual instrument cluster. The acceleration ARB ID is 244 with byte value is 5.
The program of speedometer is proceed in BASH SCRIPT using the while loop process to break the speed linit and rise upto 120kph.
Command: ./Can_bash1.sh {Execute by using the file name}
Replay Attack Instrument Cluster Program:
Speedometer:
The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.
Steps to Replay Attack process:
Step 1: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.
Syntax: candump -L vcan0 > “Replay_Attack1.log”
Step 2: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process
Syntax: canplayer -l Replay_Attack1.log {Execute with log file name}
(b). Program and Replay Attack for Indicator Signals:
In ICSim the virtual CAN message for signals using left and right arrow key is using joystick in virtual instrument cluster. The signal ARB ID is 188 with byte value is 4.
Command: cangen vcan0 -g 10 -I 188 -L 6 -D 02 00 00 00 { -g <ms> (gap in milli seconds - default: 200 ms)} & { -I <mode>(CAN ID generation mode - see below)} & { L <mode>(CAN data length code (dlc) generation mode - see below)}&{ -D <mode> (CAN data (payload) generation mode - see below)}
Payload Byte Value: Right Signal 02
Replay Attack Indicator Signals Program:
Indicator Signals:
The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.
Steps to Replay Attack process:
Step 1: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.
Syntax: candump -L vcan0 > “Replay_Attack2.log”
Step 2: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process
Syntax: canplayer -l Replay_Attack2.log {Execute with log file name}
2. Iteration Message Display and kept in Log Files:
The CAN Message is pass through on the ICSim (Instrument Cluster Stimulation ) the method iteration is form in message flow again and again in the same path of ARB ID’s while occurs in under CAN tool on CANSNIFFER. It’s keep the message in the continue flow of loop on same ARB ID’s.
Command of CANSNIFFER: cansniffer -t 0 -c vcan0 {-t <time>(timeout for ID display [x10ms] default: 500, 0 = OFF) & -c (color changes)}
Repay Attack in ICSim CAN Message:
The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.
Steps to Replay Attack process:
Step 1:In Repay Attack first program some CAN message pass, In ICSim the virtual CAN message for signals using command value 03 in payload to access virtual instrument cluster. The first signal ARB ID is 19B with byte value is 6 and Second Signal is ARB ID is 188 with byte value is 4
Command for DOOR OPEN: cansend vcan0 19B#00000E000000 {Left front Door open: Byte 02 = 0E}
Command for Indicator Signal: cangen vcan0 -g 10 -I 188 -L 6 -D 02 00 00 00 { -g <ms> (gap in milli seconds - default: 200 ms)} & { -I <mode>(CAN ID generation mode - see below)} & { L <mode>(CAN data length code (dlc) generation mode - see below)}&{ -D <mode> (CAN data (payload) generation mode - see below)}
Step 2: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.
Syntax: candump -L vcan0 > “Replay_Attack3.log” {Execute with file name}
Step 3: Using the controller to process the operation as soon as possible because in the candump tool the log store continue flow of message.
Step 4: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process.
Syntax: canplayer -l Replay_Attack3.log {Execute with file name}
Split the Log File into half :
Step 1: In the log file of replay attack there is n number message are pass including the replay attack message. But in this task we need to generate replay attack after 200 message pass through in the ICSim for replay attack.
Step 2: Using the WC for Work Count message in log file. In this Repay Attack the log file contains 12386 message are pass while during process of iteration program. The SPLIT the log file into half of the section then proceed the CANPLAYER operation for Replay Attack on the CAN message in the ICSim.
Syntax for Word Count: wc -l Replay_Attack3.log [12386] {Execute with file name}
Syntax for Split log file: split -l Replay_Attack3.log [6193] {Execute with file name}
Sample Screenshot of both WC and SPLIT log file:
Step 3: Again Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process of split log file.
Syntax: canplayer -l Replay_Attack3.log {Execute with file name}
Leave a comment
Thanks for choosing to leave a comment. Please keep in mind that all the comments are moderated as per our comment policy, and your email will not be published for privacy reasons. Please leave a personal & meaningful conversation.
Other comments...
Project 2 - Design and develop the web based Temperature control system using Beagle Bone Black.
Overview of the Project: Device Driver Write the device driver for MCP9808 Temperature Sensor. Probe function: Register the Platform device under driver/misc. Read function: It should send the i2c message to read the data from sensor and copy it to the user space. Alert pin connected to BBB as gpio interrupt. The…
02 Dec 2023 10:59 PM IST
Project 1 - Develop the full featured char driver as a loaded module
Overview of the Project: • Device Driver o Write the device driver for MCP9808 Temperature Sensor. Probe function: Register the Platform device under driver/misc. Read function: It should send the i2c message to read the data from sensor and copy it to the user space. Alert pin connected to BBB as gpio…
01 Dec 2023 10:07 AM IST
Project 3
Que. Program an attack terminal 1. The user should be able to select from the following CAN based attacks a. Full Bus DoS - The program should allow the user to set a duration for the attack b. Partial DoS - The program should ask the user “what priority should I DoS at?” - The program should allow the…
01 Dec 2023 02:28 AM IST
Project 2
Que. Write a program that performs a binary search for any given signal (The instrument cluster can be used as a source for CAN traffic) - It should record a log, assisted by user prompt, and replay all other subsequent logs according to a prompt that the user checks (Did the signal occur again? Y/N) - After every…
30 Nov 2023 10:50 PM IST
Related Courses
0 Hours of Content
Skill-Lync offers industry relevant advanced engineering courses for engineering students by partnering with industry experts.
© 2025 Skill-Lync Inc. All Rights Reserved.