02/07/2019: Interview to Gianpiero Costantino at Autoteq5G

20/06/2019: CANDY CREAM @ AUTOTEQ5G

14/05/2019: STRIVE2019 deadline extended to 20/05/2019!

26/04/2019: Candy Cream Exploit

15/04/2019: Submission to STRIVE2019 is now open!

Our Team

Coordinator

Giampaolo Bella

Giampaolo Bella

Associate Professor at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy

Home Page

Researchers

Gianpiero Costantino

Gianpiero Costantino

Researcher of the "Trustworthy and Secure Future Internet" at the "IIT" of the "CNR", Italy

Home Page

Ilaria Matteucci

Ilaria Matteucci

Researcher of the "Trustworthy and Secure Future Internet" at the "IIT" of the "CNR", Italy

Home Page

MSc/BSc Students

Pietro Biondi

Pietro Biondi

Master Student at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy

Home Page

Carlo Leo

Carlo Leo

Bachelor Student at the "Dipartimento di Informatica" of the "Università di Pisa", Italy

Apprentices (Present and Past)

Alessandro Brusca

Alessandro Brusca

Student at the "Formatica" Pisa, Italy

Valentina Melani

Valentina Melani

Student at the "Formatica" Pisa, Italy

Publications

Journals

2019

2018

Conferences and Workshops

2019

2018

2017

2016

Our Projects

TOUCAN

TOUCAN is a new security protocol designed to be secure and at the same time both CAN and AUTOSAR compliant. It achieves security in terms of authenticity, integrity and confidentiality.

Learn More

Candy

CANDY is a set of malicious APP injected into a genuine Android APP, acting as a Trojan-horse on the Android In-Vehicle infotainment system to remotely collect information circulating on the CAN bus about the vehicle.

Learn More

Cars

CARS is a Context Aware Reputation System able to identify insider attackers and isolate them taking into account contextual conditions derived from sensors spread along the entire urban network.

Learn More

CAN Flood (MSF)

CAN Flood is a post-exploitation module that floods a CAN interface for a number of rounds. The module is general as it is parametric in the frame list. CAN Flood is available within the Metasploit Framework

Learn More

CandyRe

CandyRe is a cybersecurity attack that exploits the Android ADB Debug Port Remote Access vulnerability of an Android based infotainement system to remotely send crafted CAN messages to a simulated odometer.

Learn More

Candy Cream

CandyCream is an exploit that works on an Android In-Vehicle infotainment system connected to the car through the CAN bus.

Learn More

Workshop

Seminars

Follow Us on



MIT License Copyright (c) [2019] [SOWHAT R&D] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

© 2019 Combine. All rights reserved | Design by W3layouts.

sowhat security of the way to handle automotive systems