canis labs

Canis Labs develops software, hardware and hardware IP technology for CAN bus, focused on security. It is the creator of the CAN-HG augmentation of classic CAN for adding performance and security while maintaining full compatibility with existing hardware and wiring, packing 276 bytes of payload inside an 8-byte classic CAN frame on a 250kbit/sec bus.

Our HQ is in the UK near Cambridge and we have offices in Switzerland and the US.

Canis Labs CTO Dr. Ken Tindell blogs about CAN and related technology at kentindell.github.io

news

Canis Labs Inc. President David Rajnak presented the paper Defending Controller Area Network (CAN) Buses (PDF) at the 2022 Ground Vehicle Systems Engineering Technology Symposium (August 16-18, Novi, MI). It covers the different types of attacks on CAN and techniques to defend against them.

Canis Labs CTO Dr. Ken Tindell will be speaking at AESIN 2022 (September 1, Solihull, UK) about CAN-HG augmenting CAN for much higher performance and security.

Canis Labs CTO Dr. Ken Tindell will be giving a talk at Secure Our Streets 2022 (September 15, online) about using encryption on CAN bus.

The CANPico is hardware produced by Canis Labs for rapid prototyping of CAN bus systems, with SDKs for C and MicroPython. It is also used as an evaluation platform for Canis technologies.

The CAN-HG protocol augments existing CAN with Higher speed data and provides bus Guarding support to stop spoofing and denial-of-service attacks. Most importantly, CAN-HG interoperates completely with existing CAN systems.

It is being evaluated by the United States Army Combat Capabilities Development Command (DEVCOM) Ground Vehicle Systems Center (GVSC) in a cooperative research and development agreement.

CryptoCAN is an encryption scheme for CAN frames, is designed to meet the requirements of vehicle CAN bus messaging (for example, publish/subscribe communications).

Canis Labs created the open source CANHack toolkit to demonstrate the viability of low-level attacks on the CAN protocol itself. A MicroPython version of CANHack is available for the CHV DEF CON 30 badge and the CANPico board.

The popular four-part Defending CAN video series explains how a CAN bus is attacked and gives different techniques for defending it. This first episode gives a taxonomy of attacks and shows how CAN protocol attacks work.

A CAN protocol attack is where the protocol itself can be attacked by malware sending carefully crafted signals to the TX pin of a CAN transceiver. How does malware get to control that pin? This short video explains how.

Priority Inversion is a common problem in priority-based systems, including CAN, and can lead to serious timing problems. This short video explains how. Our CTO Dr. Ken Tindell has also blogged about priority inversion and how it most famously happened on Mars.

Our CTO Dr Ken Tindell gave a seminar at the Automotive Security Research Group on CAN protocol attacks, demonstrating how they can be made by simple malware.

© 2022 Canis Automotive Labs Ltd Contact Us